When you want to gather information about users, groups, shares, and services that are visible, a process sometimes referred to as device fingerprinting, which of the following tools would be MOST appropriate?

A. port scanner
B. network enumerator
C. HTTP interceptor
D. protocol analyzer


B
Explanation: Network enumerators scan the network and gather information about users, groups, shares and services that are visible, a process sometimes referred to as device fingerprinting. They use protocols such as ICMP and SNMP to gather information.

Computer Science & Information Technology

You might also like to view...

When you create a new database, Access creates an emty table called _________.

A. Access Table1 B. Database Table1 C. New Table D. Table1

Computer Science & Information Technology

WiMAX is also referred to as 802.11a.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ________ logical operator allows you to specify two conditions for a filter and will display results when either condition is true

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If you are working with 3-D charts, you can increase the ____ to add depth to all categories of data.

A. axis width B. space depth C. gap space D. gap depth

Computer Science & Information Technology