When you want to gather information about users, groups, shares, and services that are visible, a process sometimes referred to as device fingerprinting, which of the following tools would be MOST appropriate?
A. port scanner
B. network enumerator
C. HTTP interceptor
D. protocol analyzer
B
Explanation: Network enumerators scan the network and gather information about users, groups, shares and services that are visible, a process sometimes referred to as device fingerprinting. They use protocols such as ICMP and SNMP to gather information.
You might also like to view...
When you create a new database, Access creates an emty table called _________.
A. Access Table1 B. Database Table1 C. New Table D. Table1
WiMAX is also referred to as 802.11a.
Answer the following statement true (T) or false (F)
The ________ logical operator allows you to specify two conditions for a filter and will display results when either condition is true
Fill in the blank(s) with the appropriate word(s).
If you are working with 3-D charts, you can increase the ____ to add depth to all categories of data.
A. axis width B. space depth C. gap space D. gap depth