What can an attacker use a port scanner to test for on a target computer?

A. invalid IP addresses
B. SYN flags
C. open sockets
D. ping floods


Answer: C

Computer Science & Information Technology

You might also like to view...

All split form properties can be changed in:

A) Form view. B) Design view. C) Datasheet view. D) Layout view.

Computer Science & Information Technology

After you create and insert a table of contents into a document:

What will be an ideal response?

Computer Science & Information Technology

Which of the following network component interfaces with a Telco T1 line at the demarcation point?

A. ISDN adapter B. Modem C. NIC D. CSU / DSU

Computer Science & Information Technology

Which file format supports the exchange of virtual appliances across products and platforms?

A. FAT32 B. OVF C. VMDK D. NTFS

Computer Science & Information Technology