Using a(n) _______________, hackers can probe from the network to see if your computer is vulnerable to attack.

Fill in the blank(s) with the appropriate word(s).


port scanner

correct

Computer Science & Information Technology

You might also like to view...

The relationship between tables, based on common fields, is represented in a query by a(n):

A) join. B) merge. C) parameter. D) expression.

Computer Science & Information Technology

All modern browsers can play MPEG-4 videos encoded with the __________ codec.

A. H.264 B. Theora C. VP8 D. VP9

Computer Science & Information Technology

A section that displays at the bottom of each page in a form or report.

What will be an ideal response?

Computer Science & Information Technology

When you drag a layer up or down to reposition it in the hierarchy, a thick horizontal line identifies where the layer will be repositioned.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology