A remote intruder wants to take inventory of a network so exploits can be researched. The intruder is looking for information about software versions on the network. Which of the following techniques is the intruder using?
A) Banner grabbing
B) Port scanning
C) Packet sniffing
D) Virus scanning
Correct Answer:
Verified
Q276: Attackers have been using revoked certificates for
Q277: Which of the following is used to
Q278: A technician receives a device with the
Q279: Which of the following controls allows a
Q280: When it comes to cloud computing, if
Q282: Which of the following uses precomputed hashes
Q283: A security analyst is reviewing an assessment
Q284: A forensic expert is given a hard
Q285: A computer emergency response team is called
Q286: An incident response manager has started to
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents