In performing an authorized penetration test of an organization's system security, a penetration tester collects information pertaining to the application versions that reside on a server. Which of the following is the best way to collect this type of information?

A. Protocol analyzer
B. Banner grabbing
C. Port scanning
D. Code review


Answer: B. Banner grabbing

Computer Science & Information Technology

You might also like to view...

What is the logrotate utility and how is it used?

What will be an ideal response?

Computer Science & Information Technology

When viewing a bookmark posted by other Delicious users, you can save their bookmark in your collection by ____.

A. clicking the Save link B. clicking the Bookmarks button C. dragging the Save link to the Bookmarks button D. dragging the item to the Bookmarks button

Computer Science & Information Technology

By using the ____________________ MAC address, a NIC can send a frame that every other NIC on the network will process.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Transmitted data stored locally are referred to as __________ .

A. ciphertext B. DES C. data at rest D. ECC

Computer Science & Information Technology