Security testers and hackers use which of the following to determine the services running on a host and the vulnerabilities associated with these services?
a. Zone transfers
b. Zone scanning
c. Encryption algorithms
d. Port scanning
Answer: d. Port scanning
Computer Science & Information Technology
You might also like to view...
The document inspector displays both a red exclamation point and a(n) ________ button in the dialog box if it finds sensitive or personal information within a document
Fill in the blank(s) with correct word
Computer Science & Information Technology
The ________ function calculates the periodic interest for a specified payment period on a loan or an investment
Fill in the blank(s) with correct word
Computer Science & Information Technology