________ involves connecting to or probing TCP and UDP ports on the target system to determine if the services are running or are in a listening state.
A. Vulnerability scanning
B. Workstation scanning
C. Port scanning
D. Network scanning
Answer: C. Port scanning
You might also like to view...
What function could you use to allow only one thread to run a section of code at a time?
A. mutexVar.lock() B. mutexVar.join() C. mutexVar.wait() D. mutexVar.mutex()
To select an entire word in a document by using a touchscreen, ________ the word
A) click B) double-tap C) tap D) double-click
When you need to analyze the data presented in PivotTables and PivotCharts, use a trendline to select the data to display and summarize.
Answer the following statement true (T) or false (F)
Answer the following statements true (T) or false (F)
1. Unlike RSA, DSS cannot be used for encryption or key exchange. 2. The operations performed during a round consist of circular shifts, and primitive Boolean functions based on DSS, MD5, SHA, and RSA. 3. SHA-3 algorithms must be designed to resist any potentially successful attack on SHA-2 functions. 4. Cryptographic hash functions generally execute faster in software than conventional encryption algorithms such as DES. 5. A hash function such as SHA-1 was not designed for use as a MAC and cannot be used directly for that purpose because it does not rely on a secret key.