Security testers and hackers use which of the following to determine the services running on a host and the vulnerabilities associated with these services?

a. Zone transfers
b. Zone scanning
c. Encryption algorithms
d. Port scanning

Answer: d. Port scanning

Computer Science & Information Technology

You might also like to view...

The document inspector displays both a red exclamation point and a(n) ________ button in the dialog box if it finds sensitive or personal information within a document

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ________ function calculates the periodic interest for a specified payment period on a loan or an investment

Fill in the blank(s) with correct word

Computer Science & Information Technology