Which of the following is a tool used to determine what possible points of entry exist that are open and vulnerable on your system?

A. port scanner
B. protocol finder
C. ping scanner
D. trace route

Answer: A

Computer Science & Information Technology

You might also like to view...

Before presenting at an unfamiliar site—at a conference or job interview—save your presentation in at least two locations

Indicate whether the statement is true or false

Computer Science & Information Technology

A Ping command initially uses which ICMP type code?

a. Type 0 b. Type 8 c. Type 14 d. Type 13

Computer Science & Information Technology