Port scanning allows a hacker to__________________
A) known users' passwords
B) disrupt legitimate use of a system
C) detect a system's vulnerabilities
D) modify a transmission between a remote user and a system
Correct Answer:
Verified
Q9: IPSec uses _ encryption.
A) asymmetric
B) symmetric
C) one-time
Q10: Address Space Layout Randomization (ASLR) technique protects
Q11: Why an asymmetric encryption algorithm uses two
Q12: What is the reason to use a
Q13: TLS provides security at the _ layer.
A)
Q15: Why UNIX does not suffer from viruses?
Q16: IPSs (Intrusion Prevention Systems) can detect zero-day
Q17: User authentication can be based on_
A) the
Q18: Trojan mule is a type of the
Q19: Describe the principle of least privilege.
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents