When you want to gather information about users, groups, shares, and services that are visible, a process sometimes referred to as device fingerprinting, which of the following tools would be MOST appropriate?
A. port scanner
B. network enumerator
C. HTTP interceptor
D. protocol analyzer
B
Explanation: Network enumerators scan the network and gather information about users, groups, shares and services that are visible, a process sometimes referred to as device fingerprinting. They use protocols such as ICMP and SNMP to gather information.
Computer Science & Information Technology
You might also like to view...
Match the following DateAdd function formatting to its interval format
I. Year II. Month III. Minute IV. Weekday V. Week A. n B. w C. ww D. yyyy E. m
Computer Science & Information Technology
An administrator notices an unused cable behind a cabinet that is terminated with a DB-9 connector. Which of the following protocols was MOST likely used on this cable?
A. RS-232 B. 802.3 C. ATM D. Token ring
Computer Science & Information Technology