Which of the following is a firewall discovery tool that crafts packets with a TTL set to expire one hop past the firewall?

a. Traceroute
b. Firewalk
c. Banner grabbing
d. Hping


ANS: B

Computer Science & Information Technology

You might also like to view...

After we create a(n) ____, we can send a corresponding message to a(n) ____ to elicit a desired behavior.

A. object; class B. class; object C. method; object D. object; method

Computer Science & Information Technology

Name the four generations of cellular technology, and describe each.

What will be an ideal response?

Computer Science & Information Technology

Write a function that takes a single filename as an argument and adds execute permission to the file for the user.

a. When might such a function be useful? b. Revise the script so it takes one or more filenames as arguments and adds execute permission for the user for each file argument. c. What can you do to make the function available every time you log in Suppose that, in addition to having the function available on subsequent login sessions, you want to make the function available in your current shell. How would you do so??

Computer Science & Information Technology

Which of the following is true?

a. RAM is where the CPU is located. b. Intel is the only manufacturer of CPUs. c. The CPU contains the ALU. d. The Windows System Properties window tells you how much memory you should buy.

Computer Science & Information Technology