What process allows a security professional to extract valuable information, such as information about users and recent login times from a network?

A. mapping
B. port analysis
C. enumeration
D. back scanning


Answer: C

Computer Science & Information Technology

You might also like to view...

What safeguards could be imposed?

What will be an ideal response?

Computer Science & Information Technology

The default font size in OpenOffice Writer is ________ points

A) 8 B) 10 C) 12 D) 14

Computer Science & Information Technology

Best security practices balance the need for user __________ to information with the need for adequate protection while simultaneously demonstrating fiscal responsibility.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

E:\Regions[Duluth.xlsx]1stQTR'!A1 is a reference link to a source file in different directory than the destination file.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology