Network ____ are automated tools that are designed to traverse the network in an attempt to locate available vulnerable ports and identify the services that they use.

A. node finders
B. node searchers
C. port scanners
D. port bots


Answer: C

Computer Science & Information Technology

You might also like to view...

Something is usable if people can figure out how to use it to accomplish something ______________.

a. without getting help from someone b. without it being more trouble than it’s worth c. with no training d. without getting frustrated

Computer Science & Information Technology

A network engineer is configuring a network to be able to relay IPv6 packets. The network only supports IPv4 and does not have dual-stack support. Which of the following can be used to successfully relay IPv6 packets over this network?

IPv6 tunneling OSPFv3 Dual-stack Lite GREv3 tunneling

Computer Science & Information Technology

Identify acompare function that sorts numeric values in ascending order.

A. ?function ascending(a, b) {return a - b;} B. ?function ascending(b, a) {return a;} C. ?function ascending(a, b) {return b - a;} D. ?function ascending(b, a) {return b;}

Computer Science & Information Technology

Match the following range names with their appropriate description of any problem with the name:I.10YearGoalII.Ten Year GoalIII.Ten_Year_Goal!IV.Goal10YearV.Ten_Year_GoalA.No problem, underscore used for readabilityB.No Special charactersC.No problem. Numbers used appropriatelyD.Must start with a letterE.Spaces are not allowed

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology