What process allows a security professional to extract valuable information, such as information about users and recent login times from a network?
A. mapping
B. port analysis
C. enumeration
D. back scanning
Answer: C
Computer Science & Information Technology
You might also like to view...
Which of the following is FALSE in regard to animations?
A) All animation effects are accessible from the Effect Options in the Animation group. B) Direction, smoothing, and sound are animation effects associated with some animations. C) Some animations are only available by clicking the Animation Dialog Box Launcher. D) Each animation has associated settings that vary.
Computer Science & Information Technology
An HTML table is comprised of ____ and ______
a. lines and text b. headers and body c. rows and columns d. none of the above
Computer Science & Information Technology