Security testers and hackers use which of the following to determine the services running on a host and the vulnerabilities associated with these services?

a. Zone transfers
b. Zone scanning
c. Encryption algorithms
d. Port scanning


Answer: d. Port scanning

Computer Science & Information Technology

You might also like to view...

Given that you have an object, Terrier, of the class Dog, and that an attribute of this class is Color, how would you refer to the Color attribute of the Terrier object?

a. Terrier.Color b. Dog.Terrier.Color c. Terrier.GetColor() d. Call Dog.Terrier.GetColor()

Computer Science & Information Technology

If you wanted to see how the value of Apple's stock has changed during the past year, you would use a ________ chart

A) Scatter B) Column C) Line D) Pie

Computer Science & Information Technology

Stacks are organized using the FIFO structure

Indicate whether the statement is true or false.

Computer Science & Information Technology

The following is an example of a meta tag: In this meta tag example, _____ is the value for thenameattribute.?

A. ?Jordan Wells B. ?content C. ?meta D. ?author

Computer Science & Information Technology