What do hackers use malicious port scanning to accomplish?

A. The "fingerprint" of the operating system
B. The topology of the network
C. All the computer names on the network
D. All the usernames and passwords


A. Port scanning can be used in a malicious way to find out all the openings to a computer's operating system; this is known as the "fingerprint" of the operating system. Port scanning cannot find out the topology of the network, computer names, usernames, or passwords.

Computer Science & Information Technology

You might also like to view...

The biggest drawback to SSD drives is ________

A) price B) physical size C) capacity D) speed

Computer Science & Information Technology

A(n) technical writer creates documentation for large programming projects and writes the online or printed user manuals that accompany computers, peripheral devices, and software.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In order to find the highest value of one field, the ________ technique is the easiest; in order to see multiple records with a field above a certain level, the ________ technique is best

A) filtering, sorting B) filtering, filtering C) sorting, filtering D) sorting, sorting

Computer Science & Information Technology

The default text direction is ________ position

Fill in the blank(s) with correct word

Computer Science & Information Technology