Which of the following can be used to determine which services may be running on a host, but not if they are exploitable?

A. Baseline analyzer
B. Port scanner
C. Virus scanner
D. Vulnerability scanner


Ans: B. Port scanner

Computer Science & Information Technology

You might also like to view...

________ is software stored on a flash ROM chip in a piece of hardware

A) Malware B) PnP C) Firmware D) Spyware

Computer Science & Information Technology

The ________ command is used when you want to save the entire notebook, a page, a group, or a section to a different location

Fill in the blank(s) with correct word

Computer Science & Information Technology

When you pick a color scheme after you have already begun a publication, your existing objects are not changed automatically

Indicate whether the statement is true or false

Computer Science & Information Technology

? Case-Based Critical Thinking Questions Case 6.1 Andy designed a web page for a product-oriented industry using CSS properties. He used several HTML tags to create the web page. He also used tables to ensure that the data is easily managed. Andy has created a table for product details where the names of the products and prices of the products are the headers of the table. Which of the following style rules should he add to place a border of 10-pixels around the table with a white background?

A. ?table.product {background: white; border: 10px; width: 100%;} B. ?table.product {border: 10px, white; width: 100%;} C. ?table.product {background: white, 10px; width: 100%;} D. ?table.product {border: white; width: 100%;}

Computer Science & Information Technology