During which step of the scanning and fingerprinting process can the attacker use utilities such as Angry IP Scanner and Hping to perform a ping sweep?

a. Information gathering
b. Determining the network range
c. Identifying active machines
d. OS fingerprinting


ANS: C

Computer Science & Information Technology

You might also like to view...

To access the uninstall utility, go to the ____________________, then select Uninstall a Program.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Expenses that depend on other variables are called ________ expenses

Fill in the blank(s) with correct word

Computer Science & Information Technology

Use a(n) ____ style sheet for styles that apply only to a specific Web page.

A. external B. inset C. baseline D. internal

Computer Science & Information Technology

A potential weakness in an asset or its defensive control system(s) is known as a(n) ?_________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology