In which type of scan does an attacker scan only ports that are commonly used by specific programs?
A. random scan
B. vanilla scan
C. ping sweep
D. strobe scan
Answer: D
Computer Science & Information Technology
You might also like to view...
Which type of transmission synchronization technique uses start and stop bits at the beginning and end of a data frame?
A) Synchronous B) Isochronous C) Asynchronous D) Biochronous
Computer Science & Information Technology
Which case of the following would warrant using the boolean logical inclusive OR (|) rather than the conditional OR (||)?
a) Testing if two conditions are both true. b) Testing if at least one of two conditions is true. c) Testing if at least one of two conditions is true when the right operand has a required side effect. d) Testing if at least one of two conditions is true when the left operand has a required side effect.
Computer Science & Information Technology