Under which suspicious traffic signature category would a port scan fall?

A. informational
B. reconnaissance
C. denial of service
D. unauthorized access


Answer: B

Computer Science & Information Technology

You might also like to view...

XML Schema supports a collection of built-in data types, but does not allow users to define their own.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The blocks of code that application software needs to interact with the CPU is called:

a. Automatic Programming Interface. b. Automatic Program Instruction. c. Application Programming Interface. d. Application Program Instruction.

Computer Science & Information Technology

Given the following code snippet, what will be displayed on the web page?

``` var X = 23; var Y = 3; var Z = X + Y; document.write(Z); ``` a. 26 b. 233 c. NaN d. 23 3

Computer Science & Information Technology

While using vSphere for free, you are limited to how many virtual CPUs?

A. 1 B. 8 C. 32 D. 128

Computer Science & Information Technology