Which of the following refers to the process of finding information about users, shared folders, and printers on a system?

A) Port scanning
B) Port blocking
C) Enumeration
D) Vulnerability assessment


C) Enumeration

Computer Science & Information Technology

You might also like to view...

What is a glyph?

What will be an ideal response?

Computer Science & Information Technology

Which location type is used when the computer is connected as part of a peer-to-peer network in a trusted location?

A. Public network B. Domain network C. Private network D. Work network

Computer Science & Information Technology

Cells referred to by a formula in another cell are called ________

A) Trace precedents B) precedent cells C) dependent cells D) Trace dependents

Computer Science & Information Technology

In most digital-media application programs that use a project model, you should select the menu File > Open in such programs when you want to

a. open a project file b. import other media files c. open other media files d. all of the above

Computer Science & Information Technology