________ is a procedure for identifying active hosts on a network, either to attack them or as a network security assessment.

A. Vulnerability scanning
B. Port scanning
C. Workstation scanning
D. Network scanning

Ans: D. Network scanning

Computer Science & Information Technology

You might also like to view...

Visual C# programs are created using Microsoft’s Visual Studio—a collection of software tools called a(n) ________.

a) operating system b) Integrated Programming Environment c) Integrated Development Environment d) Class Library.

Computer Science & Information Technology

?Last week Jake and Gina used their computer programming skills to illegally gain access to a local veterinary clinic's customer database. They stole the customers' names, addresses, and credit card numbers, and they're now using this information to purchase things from the Internet. Jake and Gina are _________.

A. ?end users B. ?cyberterrorists C. ?cybercriminals D. ?all of these

Computer Science & Information Technology