Which of the following is a purpose for scanning?
A. to use open ports
B. to discover exploitable communications channels
C. to list IP addresses
D. to transfer the request to the Web server
Answer: B. to discover exploitable communications channels
Computer Science & Information Technology
You might also like to view...
In an NLB cluster, how does the Network affinity setting work?
What will be an ideal response?
Computer Science & Information Technology
Fractals that yield an exact copy of the original when a portion of the original image is magnified are called fractals.
a. strictly self-similar. b. Koch Curve. c. similar. d. mirror.
Computer Science & Information Technology