Which of the following is a purpose for scanning?

A. to use open ports
B. to discover exploitable communications channels
C. to list IP addresses
D. to transfer the request to the Web server

Answer: B. to discover exploitable communications channels

Computer Science & Information Technology

You might also like to view...

In an NLB cluster, how does the Network affinity setting work?

What will be an ideal response?

Computer Science & Information Technology

Fractals that yield an exact copy of the original when a portion of the original image is magnified are called fractals.

a. strictly self-similar. b. Koch Curve. c. similar. d. mirror.

Computer Science & Information Technology