____________________ involves the use of active investigation methods to gather information about a system or an infrastructure directly.

Fill in the blank(s) with the appropriate word(s).


Active reconnaissance

Computer Science & Information Technology

You might also like to view...

A package is:

a. A directory structure used to organize classes and interfaces. b. A mechanism for software reuse. c. A group of related classes and interfaces. d. All of the above.

Computer Science & Information Technology

The _________ transfer encoding, also known as radix-64 encoding, is a common one for encoding arbitrary binary data in such a way as to be invulnerable to the processing by mail-transport programs.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

_____ serves as an escape route for out-of-control electricity.

A. Grounding B. Fuse C. Power Station D. Current

Computer Science & Information Technology

What Windows command displays or alters the compression of files on NTFS partitions?

A. compact B. cipher C. doskey D. xpntfs

Computer Science & Information Technology