Which of the following would a network administrator use to scan a network for vulnerabilities?

A. ICMP
B. NMAP
C. ACL
D. TCPDUMP


Answer: B. NMAP

Computer Science & Information Technology

You might also like to view...

When invoking a method with an object argument, ___________ is passed.

a. the contents of the object b. a copy of the object c. the reference of the object d. the object is copied, then the reference of the copied object

Computer Science & Information Technology

The ____ element defines a distinct piece of content.

a. Heading b. Anchor c. Article d. Em

Computer Science & Information Technology

Office 2013 enables you to save files to SkyDrive or your computer. Why might it be helpful to save a file in both locations?

What will be an ideal response?

Computer Science & Information Technology

The registration point of a symbol is usually at the center of the symbol, and it can be used to control how the symbol is animated.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology