________ is a procedure for identifying active hosts on a network, either to attack them or as a network security assessment.

A. Vulnerability scanning
B. Port scanning
C. Workstation scanning
D. Network scanning


Ans: D. Network scanning

Computer Science & Information Technology

You might also like to view...

Press the Esc key to hide the Paste Options button, which appears after content is pasted from the Clipboard

Indicate whether the statement is true or false

Computer Science & Information Technology

Before text effects are applied to a title in a document, the title should be:

A) centered. B) selected. C) cleared of all other formatting. D) a Heading 1 style.

Computer Science & Information Technology

Which of the following describes what happens when you select an object in the Flash Library panel?

A. The object is moved to the Stage B. The object appears in the Preview window C. The object is displayed in the edit window D. The object is saved with the Flash movie

Computer Science & Information Technology

A directory inside another directory is sometimes referred to as a ____.

A. subdirectory B. subfile C. child directory D. nested directory

Computer Science & Information Technology