Attackers use information collected through ________ to identify vulnerabilities or weak points in system security.

A. enumeration
B. networking
C. footprinting
D. forensics


Answer: A. enumeration

Computer Science & Information Technology

You might also like to view...

The class JFrame has a method named __________ that eliminates the invoking JFrame without terminating the program.

a. close b. dispose c. eliminate d. None of the above

Computer Science & Information Technology

If a table flows onto multiple pages, you can set the header row to display at the top of each page in the ________ dialog box

A) Table Properties B) Create New Style from Formatting C) Style Pane Options D) Layout Options

Computer Science & Information Technology

________ software is end-user software designed to accomplish a variety of tasks.

A. Communications B. Utility C. System D. Application

Computer Science & Information Technology

Which protocol offers guaranteed delivery and is connection oriented?

A. UDP B. IP C. TCP D. TFTP

Computer Science & Information Technology