In the enumeration phase, attackers create active connections to the target system and perform directed queries to gain more information about the target.

a. true
b. false


Answer: a. true

Computer Science & Information Technology

You might also like to view...

The merge sort algorithm:

a. Can only be used on vectors of even length. b. Works by reducing vectors down to the base case of a two-element vector. c. Works by merging two sorted vectors into one larger sorted vector. d. Cannot be implemented recursively.

Computer Science & Information Technology

The __________ indicates that the subscriber identified in the certificate has sole control and access to the private key.

A. OAEP B. Public Key Certificate C. Digital Signature D. PKI

Computer Science & Information Technology

Which Cisco IOS command is used to alter the maximum number of EIGRP for IPv6 routes that are able to be placed into the routing table?

A) maximum-paths paths B) maximum routes num-routes C) max-routes num-routes D) max-paths paths

Computer Science & Information Technology

Every configurable network device comes with a tool to document its _______________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology