Which of the following tools can be used to manually scan a system for vulnerabilities?

A) Ping
B) Telnet
C) Share Enum
D) Oph Crack

B) Telnet

Computer Science & Information Technology

You might also like to view...

Templates may be used to make available a very large collection of _____.

a) programs b) classes c) files d) functions e) none of the above. C++ doesn't support templates.

Computer Science & Information Technology

Arrow keys can manipulate a JSlider object. Which of the following statements does not correctly describe how the arrow keys are used?

a. The left-arrow and right arrow keys decrease or increase (respectively) the thumb of the JSlider by 1. b. The down-arrow and up-arrow keys decrease or increase (respectively) the thumb of the JSlider by 1. c. The PgDn and PgUp keys decrease or increase (respectively) by block increments of one-tenth of the range of values. d. The Home key and End key move the thumb to the maximum or minimum (respectively) value of the JSlider.

Computer Science & Information Technology