________ is a procedure for identifying active hosts on a network, either to attack them or as a network security assessment.
A. Vulnerability scanning
B. Port scanning
C. Workstation scanning
D. Network scanning
Ans: D. Network scanning
You might also like to view...
Press the Esc key to hide the Paste Options button, which appears after content is pasted from the Clipboard
Indicate whether the statement is true or false
Before text effects are applied to a title in a document, the title should be:
A) centered. B) selected. C) cleared of all other formatting. D) a Heading 1 style.
Which of the following describes what happens when you select an object in the Flash Library panel?
A. The object is moved to the Stage B. The object appears in the Preview window C. The object is displayed in the edit window D. The object is saved with the Flash movie
A directory inside another directory is sometimes referred to as a ____.
A. subdirectory B. subfile C. child directory D. nested directory