What does the following command accomplish? nc –v –z –w 1 10.10.23.4 1-1024
a. Starts a listener on the hacker's machine
b. Port scans the following IP address 10.10.23.4
c. Blocks traffic to the following IP address 10.10.23.4
d. Allows all traffic to the following IP address 10.10.23.4
ANS: B
Computer Science & Information Technology
You might also like to view...
A screen clipping can be very small or as large as the entire screen
Indicate whether the statement is true or false.
Computer Science & Information Technology
What operating system feature enables the operating system to automatically detect newly installed hardware?
A. ActiveX B. plug and play C. the registry D. component object
Computer Science & Information Technology