This is used by the network administrator to scan a local computer or other computers internal to a network to determine what network ports and services are being made available to users.

What will be an ideal response?


port scanner

Computer Science & Information Technology

You might also like to view...

Which is the proper way to create a built-in array of structure variables of type Data?

a. MyArray Data[10] b. Data MyArray[10]; c. Data struct myArray[10]; d. struct MyArray[Data];

Computer Science & Information Technology

To indicate the data type of a variable in a UML diagram, you enter __________.

a. the variable name followed by the data type b. the variable name followed by a colon and the data type c. the class name followed by the variable name followed by the data type d. the data type followed by the variable name

Computer Science & Information Technology

In MySQL, a deterministic function will, given the same parameter, always return:

a. an error b. a different value c. no value d. the same value

Computer Science & Information Technology

?The purpose of Advanced Persistent Threat (APT) usually is to ____.

A. ?steal money B. interrupt service C. steal data D. ?annoy the users

Computer Science & Information Technology