In ____, the target host transmits connection-succeeded messages for active ports and host-unreachable messages for inactive ports.?

A. ?UDP scanning
B. ?ping scanning
C. ?TCP connect scanning
D. ?IP protocol scanning


Answer: C

Computer Science & Information Technology

You might also like to view...

You can use Excel to organize records, financial transactions, and business information in the form of worksheets

Indicate whether the statement is true or false

Computer Science & Information Technology

In a PON setup, the system is considered passive because no repeaters or other devices intervene between the carrier and the customer.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is not a form of electronic output?

A) web pages B) email C) report D) online message boards

Computer Science & Information Technology

Which of the following statements is considered a benefit of a computer-oriented society?

A. ?As more and more data about our everyday activities is collected and stored on computers accessible via the Internet, our privacy is never at risk. B. ?There is no potential risk to personal privacy, which is one of the most important societal advantages. C. ?It increases the need of people and reduces unemployment in society. D. ?The capability to virtually design, build, and test new buildings before the actual construction begins helps professionals create safer products.

Computer Science & Information Technology