Which of the following utilities performs sophisticated vulnerability scans, and can identify unencrypted data such as credit card numbers?
a. Nmap
b. Nessus
c. Metasploit
d. L0phtcrack
ANSWER: b
Computer Science & Information Technology
You might also like to view...
Referring to the accompanying figure, the _____ group contains the button used to paste a formula into a new cell.
A. Editing B. Clipboard C. Cells D. Number
Computer Science & Information Technology
The ____________________ tool changes the attributes or properties of a stroke, or it applies a stroke to an object that has no stroke.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Explorer uses a green capacity stripe to indicate drives with more than 10% free space
Indicate whether the statement is true or false
Computer Science & Information Technology
The RS-232 standard specifies that computer devices have ____________________ connectors
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology