During which step of the scanning and fingerprinting process can the attacker use utilities such as Nmap and SuperScan to perform a port scanning?
a. Information gathering
b. Determining the network range
c. Identifying active machines
d. Finding open ports and applications
ANS: D
Computer Science & Information Technology
You might also like to view...
The term ________ is derived from the phrase Web log
Fill in the blank(s) with correct word
Computer Science & Information Technology
Answer the following statements true (T) or false (F)
1. The case logic structure allows the repetition and choice of multiple sets of instructions. 2. The OTHERWISE is a catchall choice when there are no other matches in the case logic structure. 3. There must be only one instruction for each constant in a case logic structure. 4. The use of the OTHERWISE in the case logic structure may be used as error detection.
Computer Science & Information Technology