What can an attacker use a port scanner to test for on a target computer?
A. invalid IP addresses
B. SYN flags
C. open sockets
D. ping floods
Answer: C
Computer Science & Information Technology
You might also like to view...
All split form properties can be changed in:
A) Form view. B) Design view. C) Datasheet view. D) Layout view.
Computer Science & Information Technology
After you create and insert a table of contents into a document:
What will be an ideal response?
Computer Science & Information Technology
Which of the following network component interfaces with a Telco T1 line at the demarcation point?
A. ISDN adapter B. Modem C. NIC D. CSU / DSU
Computer Science & Information Technology
Which file format supports the exchange of virtual appliances across products and platforms?
A. FAT32 B. OVF C. VMDK D. NTFS
Computer Science & Information Technology