In performing an authorized penetration test of an organization's system security, a penetration tester collects information pertaining to the application versions that reside on a server. Which of the following is the best way to collect this type of information?
A. Protocol analyzer
B. Banner grabbing
C. Port scanning
D. Code review
Answer: B. Banner grabbing
Computer Science & Information Technology
You might also like to view...
What is the logrotate utility and how is it used?
What will be an ideal response?
Computer Science & Information Technology
When viewing a bookmark posted by other Delicious users, you can save their bookmark in your collection by ____.
A. clicking the Save link B. clicking the Bookmarks button C. dragging the Save link to the Bookmarks button D. dragging the item to the Bookmarks button
Computer Science & Information Technology
By using the ____________________ MAC address, a NIC can send a frame that every other NIC on the network will process.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Transmitted data stored locally are referred to as __________ .
A. ciphertext B. DES C. data at rest D. ECC
Computer Science & Information Technology