Which of the following tools can be used to manually scan a system for vulnerabilities?

a. Ping
b. Telnet
c. ShareEnum
d. Ophcrack


ANS: B

Computer Science & Information Technology

You might also like to view...

When a C program passes an array as a function argument,

a. the value of the initial element of the array is actually passed. b. the address of the initial element of the array is actually passed. c. the entire array is copied into the function's data area. d. the addresses of the initial and final elements of the array are copied into the function's data area. e. none of the above.

Computer Science & Information Technology

PowerPoint displays a(n) ____________________ between slides to indicate the proposed slide position before you release the mouse button.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

PowerPoint provides an inline spelling checker that automatically indicates possible spelling errors with wavy _____ underlines.

A. grey B. blue C. red D. green

Computer Science & Information Technology

What is prime factorization?

a. Determining the prime factors of a given number b. Determining if a number is prime c. Computing a prime number of n digits d. Multiplying two prime numbers

Computer Science & Information Technology