Attackers use information collected through ________ to identify vulnerabilities or weak points in system security.
A. enumeration
B. networking
C. footprinting
D. forensics
Answer: A. enumeration
Computer Science & Information Technology
You might also like to view...
The class JFrame has a method named __________ that eliminates the invoking JFrame without terminating the program.
a. close b. dispose c. eliminate d. None of the above
Computer Science & Information Technology
If a table flows onto multiple pages, you can set the header row to display at the top of each page in the ________ dialog box
A) Table Properties B) Create New Style from Formatting C) Style Pane Options D) Layout Options
Computer Science & Information Technology
________ software is end-user software designed to accomplish a variety of tasks.
A. Communications B. Utility C. System D. Application
Computer Science & Information Technology
Which protocol offers guaranteed delivery and is connection oriented?
A. UDP B. IP C. TCP D. TFTP
Computer Science & Information Technology