Under which suspicious traffic signature category would a port scan fall?
A. informational
B. reconnaissance
C. denial of service
D. unauthorized access
Answer: B
You might also like to view...
XML Schema supports a collection of built-in data types, but does not allow users to define their own.
Answer the following statement true (T) or false (F)
The blocks of code that application software needs to interact with the CPU is called:
a. Automatic Programming Interface. b. Automatic Program Instruction. c. Application Programming Interface. d. Application Program Instruction.
Given the following code snippet, what will be displayed on the web page?
``` var X = 23; var Y = 3; var Z = X + Y; document.write(Z); ``` a. 26 b. 233 c. NaN d. 23 3
While using vSphere for free, you are limited to how many virtual CPUs?
A. 1 B. 8 C. 32 D. 128