Which of the following types of attacks can be used to find the Remote Procedure Call service on a system when using SATAN?

a. Light
b. Normal
c. Medium
d. Heavy


ANS: A

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1) The only C++ operators that can be overloaded are << and >>. 2) A derived class inherits the base class's constructors so the programmer need not define new constructors. 3) A class's member functions represent the attributes of the object modeled. 4) If a GreenBlob is a kind of Blob, then Blob would be defined as a base class and GreenBlob as a derived class. 5) An accessor function provides read-only access to a private component of an object.

Computer Science & Information Technology

A file format frequently used to store records prior to importing them into Access is ________

A) Excel B) Word C) PowerPoint D) OneNote

Computer Science & Information Technology

A computer's storage media can hold hundreds of thousands of files

Indicate whether the statement is true or false

Computer Science & Information Technology

What is the Multilink protocol, and how is it used with remote access servers?

What will be an ideal response?

Computer Science & Information Technology