Sara, a security analyst, suspects that a rogue web server is running on the network. Which of the following would MOST likely be used to identify the server's IP address?
A. Port scanner
B. Telnet
C. Traceroute
D. Honeypot
Answer: A. Port scanner
Computer Science & Information Technology
You might also like to view...
The __________ is when a small change in plaintext or key produces a large change in the ciphertext.
A. avalanche effect B. Rcon C. key expansion D. auxiliary exchange
Computer Science & Information Technology
A file with the .jpeg extension is a(n) ________ file
A) compressible image B) compressed file C) Adobe PDF D) Word document
Computer Science & Information Technology
Which of the following is NOT a Video Tools Playback tab option?
A) Size the video B) Set the video to play full screen C) Trim the video D) Fade the video
Computer Science & Information Technology
Which of the following is the lowest-privilege account required to install most programs on Windows XP?
a. Admin b. Standard User c. Power User d. Guest
Computer Science & Information Technology