Which of the following involves using various tools to find vulnerabilities in a system?

a. Port scanning
b. Port blocking
c. Enumeration
d. Vulnerability assessment


ANS: D

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Inside a Java method definition, you can use the keyword this as a name for the calling object. 2. Boolean expressions may be used to control if-else or while statements. 3. The modifier private means that an instance variable can be accessed by name outside of the class definition. 4. It is considered good programming practice to validate a value passed to a mutator method before setting the instance variable.

Computer Science & Information Technology

When you define a name, the stored definition is a(n) ________ reference and includes the worksheet name

Fill in the blank(s) with correct word

Computer Science & Information Technology

?In the context of hypertext attribute, identify a target name that opens the page in the current window or tab.

A. ?_blank B. ?_parent C. ?_self D. ?_top

Computer Science & Information Technology

If a picture in your photo album is too light or too dark, you can adjust its ____ to enhance its appearance.

A. contrast B. depth C. brightness D. shading

Computer Science & Information Technology