What communications technique can a hacker use to identity the product that is running on an open port facing the Internet?
a. Credentialed penetration test
b. Banner grabbing
c. Intrusive vulnerability scan
d. Port scanning
Answer: b. Banner grabbing
Computer Science & Information Technology
You might also like to view...
To show a "hidden" row one (1 ) or a "hidden" column A
A) use only a Ribbon command with arrows . B) scroll to the left. C) type A1 in the name box and then press "Enter" D) scroll to the right.
Computer Science & Information Technology
In an XHTML page that contains no attribute, text will display at:
A) the default font size of the viewer's computer. B) a default size of 10 pts. C) a default size of 14 pts. D) the default size and width of the browser window.
Computer Science & Information Technology