Which of the following tools can be used to manually scan a system for vulnerabilities?
a. Ping
b. Telnet
c. ShareEnum
d. Ophcrack
ANS: B
You might also like to view...
When a C program passes an array as a function argument,
a. the value of the initial element of the array is actually passed. b. the address of the initial element of the array is actually passed. c. the entire array is copied into the function's data area. d. the addresses of the initial and final elements of the array are copied into the function's data area. e. none of the above.
PowerPoint displays a(n) ____________________ between slides to indicate the proposed slide position before you release the mouse button.
Fill in the blank(s) with the appropriate word(s).
PowerPoint provides an inline spelling checker that automatically indicates possible spelling errors with wavy _____ underlines.
A. grey B. blue C. red D. green
What is prime factorization?
a. Determining the prime factors of a given number b. Determining if a number is prime c. Computing a prime number of n digits d. Multiplying two prime numbers