Sara, the Chief Information Officer (CIO), has requested an audit take place to determine what services and operating systems are running on the corporate network. Which of the following should be used to complete this task?

A. Fingerprinting and password crackers
B. Fuzzing and a port scan
C. Vulnerability scan and fuzzing
D. Port scan and fingerprinting


Ans: D. Port scan and fingerprinting

Computer Science & Information Technology

You might also like to view...

Explain why the environment in which a computer-based system is installed may have unanticipated effects on the system that lead to system failure.

What will be an ideal response?

Computer Science & Information Technology

COGNITIVE ASSESSMENT If your instructor advises you to use the keys at the top of your keyboard that are identified by the letter F and then a number to perform certain activities, what kind of keys is she advising you to use?

A. facilitating keys B. function keys C. feature keys D. finger keys

Computer Science & Information Technology

Screen savers were designed to prevent the problem of _____.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

RJ-45 is visibly much _______________ than RJ-11.

A. thinner B. wider C. longer D. shorter

Computer Science & Information Technology