Which of the following can hackers can use as part of a reconnaissance process to learn about active network addresses and active processes?

A. availability
B. ICMP
C. auto recovery
D. presence

Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following statements about abstract superclasses is true?

a. abstract superclasses may contain data. b. abstract superclasses may not contain implementations of methods. c. abstract superclasses must declare all methods as abstract. d. abstract superclasses must declare all data members not given values as abstract.

Computer Science & Information Technology

Answer the following questions true (T) or false (F)

1. You can use the static qualifier with a global function, class or variable to get the same effect as an unnamed namespace. 2. In a particular file, the names from the global namespace and names from an unnamed namespace defined in the file are accesses the same way: by writing the name.

Computer Science & Information Technology