What communications technique can a hacker use to identity the product that is running on an open port facing the Internet?

a. Credentialed penetration test
b. Banner grabbing
c. Intrusive vulnerability scan
d. Port scanning


Answer: b. Banner grabbing

Computer Science & Information Technology

You might also like to view...

Any statements you place within the ____ control will be performed in the order they appear, top to bottom.

A. for allĀ  B. do next C. while in order D. do in order

Computer Science & Information Technology

How should the initial inventory be used when classifying and categorizing assets?

What will be an ideal response?

Computer Science & Information Technology

In general, according to recent reports by the Pew Internet & American Life Project, individuals with a lower level of income or a lower level of education are more likely to go online.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ____________________ jQuery UI widget provides a set of buttons, which may be linked to other pages or files.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology