___________ is the process to find out what is on a target system

a. Enumeration
b. Phishing
c. Mapping
d. Scanning


Answer A. If the target is the entire network, then the attacker is trying to find out what servers, computers, and printers are on that network.

Computer Science & Information Technology

You might also like to view...

What tools can be used to design your own people objects?

a. Alice builders b. Character builders c. Gallery builders d. People builders e. None of these

Computer Science & Information Technology

What property causes a control to disappear when set to False?

(A) Detectible (B) Visible (C) Disabled (D) Supported

Computer Science & Information Technology

Which of the statements will unhighlight any highlighted item in lstBox?

(A) lstBox.SelectedItem = Nothing (B) lstBox.SelectedItem = " " (C) lstBox.SelectedIndex = 0 (D) lstBox.SelectedIndex = -1

Computer Science & Information Technology

Discuss the role of opacity as it relates to the Brush tool. How does setting a low percentage of opacity affect the impact of the brush?

What will be an ideal response?

Computer Science & Information Technology