A black hat hacker is enumerating a network and wants to remain covert during the process. The hacker initiates a vulnerability scan. Given the task at hand the requirement of being covert, which of the following statements BEST indicates that the vulnerability scan meets these requirements?
A. The vulnerability scanner is performing an authenticated scan.
B. The vulnerability scanner is performing local file integrity checks.
C. The vulnerability scanner is performing in network sniffer mode.
D. The vulnerability scanner is performing banner grabbing.
Answer: C. The vulnerability scanner is performing in network sniffer mode.
You might also like to view...
Define the quality of a ring flash
What will be an ideal response?
The _____ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation.
A. Cable Act of 1992 B. Electronic Communications Privacy Act of 1986 C. Gramm-Leach-Bliley Act of 1999 D. USA Patriot Act of 2001