Which of the following is a tool used to determine what possible points of entry exist that are open and vulnerable on your system?

A. port scanner
B. protocol finder
C. ping scanner
D. trace route


Answer: A

Computer Science & Information Technology

You might also like to view...

The ____ system integrates all necessary controls for all relevant recommendations into a single comprehensive solution.

A. department information security B. company-wide information security C. unit information security D. personal information security

Computer Science & Information Technology

Within the Samba configuration module window, describe how the Identity tab is used.

What will be an ideal response?

Computer Science & Information Technology

The term cloud is based on the cloud-shaped image used in networking diagrams to illustrate the Internet

Indicate whether the statement is true or false

Computer Science & Information Technology

Table Styles gallery does NOT contain the ________ category

A) Best Match for Document B) Customize for Slide C) Light D) Medium

Computer Science & Information Technology