Sara, a security analyst, suspects that a rogue web server is running on the network. Which of the following would MOST likely be used to identify the server's IP address?

A. Port scanner
B. Telnet
C. Traceroute
D. Honeypot


Answer: A. Port scanner

Computer Science & Information Technology

You might also like to view...

The __________ is when a small change in plaintext or key produces a large change in the ciphertext.

A. avalanche effect B. Rcon C. key expansion D. auxiliary exchange

Computer Science & Information Technology

A file with the .jpeg extension is a(n) ________ file

A) compressible image B) compressed file C) Adobe PDF D) Word document

Computer Science & Information Technology

Which of the following is NOT a Video Tools Playback tab option?

A) Size the video B) Set the video to play full screen C) Trim the video D) Fade the video

Computer Science & Information Technology

Which of the following is the lowest-privilege account required to install most programs on Windows XP?

a. Admin b. Standard User c. Power User d. Guest

Computer Science & Information Technology