During which step of the scanning and fingerprinting process can the attacker use utilities such as Angry IP Scanner and Hping to perform a ping sweep?
a. Information gathering
b. Determining the network range
c. Identifying active machines
d. OS fingerprinting
ANS: C
Computer Science & Information Technology
You might also like to view...
To access the uninstall utility, go to the ____________________, then select Uninstall a Program.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Expenses that depend on other variables are called ________ expenses
Fill in the blank(s) with correct word
Computer Science & Information Technology
Use a(n) ____ style sheet for styles that apply only to a specific Web page.
A. external B. inset C. baseline D. internal
Computer Science & Information Technology
A potential weakness in an asset or its defensive control system(s) is known as a(n) ?_________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology