A port scanner is a tool useful to an attacker to identify possible vulnerabilities in a potential victim’s system. Cite a situation in which someone who is not an attacker could use a port scanner for a nonmalicious purpose.

What will be an ideal response?


Testing for known vulnerabilities an attacker might exploit.

Computer Science & Information Technology

You might also like to view...

Match the following terms to their meanings:

I. Clipboard II. Copy III. Paste IV. Source table V. Destination table A. makes a duplicate version the original B. a table from which you are copying records C. Office temporary storage area D. a table to which records are appended E. moves a copy of a selected item from the Clipboard to a new location

Computer Science & Information Technology

____ VLANs are configured port-by-port, with each port being associated with a particular VLAN.

A. Dynamic B. physical C. virtual D. Static

Computer Science & Information Technology

Henry uses a laptop and has noticed that sometimes when he is typing, the cursor will move, causing him to mistype words or even delete sentences or entire paragraphs. Henry has tried not to touch the touchpad on his laptop, but the problem still occurs. ? What can Henry do to remedy this problem?

A. He can connect a touch screen monitor. B. He can attach a USB mouse. C. He can turn off the touchpad in Windows. D. He can put a sheet of paper over the touchpad.

Computer Science & Information Technology

Which type of application would benefit most from traffic shaping on a busy network?

a. Skype b. file transfer c. web browser d. email

Computer Science & Information Technology