What communications technique can a hacker use to identity the product that is running on an open port facing the Internet?
a. Credentialed penetration test
b. Banner grabbing
c. Intrusive vulnerability scan
d. Port scanning
Answer: b. Banner grabbing
You might also like to view...
Any statements you place within the ____ control will be performed in the order they appear, top to bottom.
A. for allĀ B. do next C. while in order D. do in order
How should the initial inventory be used when classifying and categorizing assets?
What will be an ideal response?
In general, according to recent reports by the Pew Internet & American Life Project, individuals with a lower level of income or a lower level of education are more likely to go online.
Answer the following statement true (T) or false (F)
The ____________________ jQuery UI widget provides a set of buttons, which may be linked to other pages or files.
Fill in the blank(s) with the appropriate word(s).