Which of the following is a tool used to determine what possible points of entry exist that are open and vulnerable on your system?
A. port scanner
B. protocol finder
C. ping scanner
D. trace route
Answer: A
Computer Science & Information Technology
You might also like to view...
Before presenting at an unfamiliar site—at a conference or job interview—save your presentation in at least two locations
Indicate whether the statement is true or false
Computer Science & Information Technology
A Ping command initially uses which ICMP type code?
a. Type 0 b. Type 8 c. Type 14 d. Type 13
Computer Science & Information Technology