To obtain IP addresses through reconnaissance, an attacker can use ________.

Both IP address spoofing and a chain of attack computers
IP address spoofing
a chain of attack computers
Both IP address spoofing and a chain of attack computers
Neither IP address spoofing nor a chain of attack computers


Both IP address spoofing and a chain of attack computers

Computer Science & Information Technology

You might also like to view...

For this question, assume myView references an ImageView object. In order to preserve the image's aspect ratio (so it does not appear stretched or distorted), you should use which of the following?

a. myView.setPreserveRatio(false); b. myView.setPreserveRatio(true); c. myView.setPreserveRatio(); d. Either (a) or (c) would work.

Computer Science & Information Technology

This is used to create a virtual link from one site to the other. It essentially replaces the traditional WAN-type connection used in connecting typical sites.

What will be an ideal response?

Computer Science & Information Technology

Which of the following functions searches a string for a substring and returns an index of the found substring if it is found?

a) Len b) Left c) Instr d) Filter

Computer Science & Information Technology

What is the principle of least privilege?

What will be an ideal response?

Computer Science & Information Technology