A port scanner is a tool useful to an attacker to identify possible vulnerabilities in a potential victim’s system. Cite a situation in which someone who is not an attacker could use a port scanner for a nonmalicious purpose.
What will be an ideal response?
Testing for known vulnerabilities an attacker might exploit.
You might also like to view...
Match the following terms to their meanings:
I. Clipboard II. Copy III. Paste IV. Source table V. Destination table A. makes a duplicate version the original B. a table from which you are copying records C. Office temporary storage area D. a table to which records are appended E. moves a copy of a selected item from the Clipboard to a new location
____ VLANs are configured port-by-port, with each port being associated with a particular VLAN.
A. Dynamic B. physical C. virtual D. Static
Henry uses a laptop and has noticed that sometimes when he is typing, the cursor will move, causing him to mistype words or even delete sentences or entire paragraphs. Henry has tried not to touch the touchpad on his laptop, but the problem still occurs. ? What can Henry do to remedy this problem?
A. He can connect a touch screen monitor. B. He can attach a USB mouse. C. He can turn off the touchpad in Windows. D. He can put a sheet of paper over the touchpad.
Which type of application would benefit most from traffic shaping on a busy network?
a. Skype b. file transfer c. web browser d. email