When you want to gather information about users, groups, shares, and services that are visible, a process sometimes referred to as device fingerprinting, which of the following tools would be MOST appropriate?

A. port scanner
B. network enumerator
C. HTTP interceptor
D. protocol analyzer

B
Explanation: Network enumerators scan the network and gather information about users, groups, shares and services that are visible, a process sometimes referred to as device fingerprinting. They use protocols such as ICMP and SNMP to gather information.

Computer Science & Information Technology

You might also like to view...

Match the following DateAdd function formatting to its interval format

I. Year II. Month III. Minute IV. Weekday V. Week A. n B. w C. ww D. yyyy E. m

Computer Science & Information Technology

An administrator notices an unused cable behind a cabinet that is terminated with a DB-9 connector. Which of the following protocols was MOST likely used on this cable?

A. RS-232 B. 802.3 C. ATM D. Token ring

Computer Science & Information Technology