Which of the following refers to the process of finding information about users, shared folders, and printers on a system?
A) Port scanning
B) Port blocking
C) Enumeration
D) Vulnerability assessment
C) Enumeration
Computer Science & Information Technology
You might also like to view...
What is a glyph?
What will be an ideal response?
Computer Science & Information Technology
Which location type is used when the computer is connected as part of a peer-to-peer network in a trusted location?
A. Public network B. Domain network C. Private network D. Work network
Computer Science & Information Technology
Cells referred to by a formula in another cell are called ________
A) Trace precedents B) precedent cells C) dependent cells D) Trace dependents
Computer Science & Information Technology
In most digital-media application programs that use a project model, you should select the menu File > Open in such programs when you want to
a. open a project file b. import other media files c. open other media files d. all of the above
Computer Science & Information Technology