Attackers use information collected through ________ to identify vulnerabilities or weak points in system security.

A. enumeration
B. networking
C. footprinting
D. forensics

Answer: A. enumeration

Computer Science & Information Technology

You might also like to view...

What is one advantage of using labels inside of Unity?

What will be an ideal response?

Computer Science & Information Technology

MC Composition is represented with a(n)______ relationship.

a) is-a. b) has-a. c) uses. d) None of the above.

Computer Science & Information Technology