A black hat hacker is enumerating a network and wants to remain covert during the process. The hacker initiates a vulnerability scan. Given the task at hand the requirement of being covert, which of the following statements BEST indicates that the vulnerability scan meets these requirements?

A. The vulnerability scanner is performing an authenticated scan.
B. The vulnerability scanner is performing local file integrity checks.
C. The vulnerability scanner is performing in network sniffer mode.
D. The vulnerability scanner is performing banner grabbing.

Answer: C. The vulnerability scanner is performing in network sniffer mode.

Computer Science & Information Technology

You might also like to view...

Define the quality of a ring flash

What will be an ideal response?

Computer Science & Information Technology

The _____ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation.

A. Cable Act of 1992 B. Electronic Communications Privacy Act of 1986 C. Gramm-Leach-Bliley Act of 1999 D. USA Patriot Act of 2001

Computer Science & Information Technology