________ involves connecting to or probing TCP and UDP ports on the target system to determine if the services are running or are in a listening state.

A. Vulnerability scanning
B. Workstation scanning
C. Port scanning
D. Network scanning


Answer: C. Port scanning

Computer Science & Information Technology

You might also like to view...

What function could you use to allow only one thread to run a section of code at a time?

A. mutexVar.lock() B. mutexVar.join() C. mutexVar.wait() D. mutexVar.mutex()

Computer Science & Information Technology

To select an entire word in a document by using a touchscreen, ________ the word

A) click B) double-tap C) tap D) double-click

Computer Science & Information Technology

When you need to analyze the data presented in PivotTables and PivotCharts, use a trendline to select the data to display and summarize.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Unlike RSA, DSS cannot be used for encryption or key exchange. 2. The operations performed during a round consist of circular shifts, and primitive Boolean functions based on DSS, MD5, SHA, and RSA. 3. SHA-3 algorithms must be designed to resist any potentially successful attack on SHA-2 functions. 4. Cryptographic hash functions generally execute faster in software than conventional encryption algorithms such as DES. 5. A hash function such as SHA-1 was not designed for use as a MAC and cannot be used directly for that purpose because it does not rely on a secret key.

Computer Science & Information Technology