
Hackers identify possible victim computers by sending ________.
A) scouts
B) probe packets
C) exploits
D) Mocking Jays
Correct Answer:
Verified
Q26: Attack programs that can be remotely controlled
Q28: Methods that hackers use to break into
Q43: Hackers send probe packets to identify _.
A)IP
Q44: What are the most dangerous types of
Q45: The last stage in a hacking attack
Q48: A way back into a system that
Q49: The last stage in a hacking attack
Q50: DoS attacks attempt to _.
A)hack a computer
B)reduce
Q51: It is still hacking if a person
Q52: Cyberwar attacks are made by national governments
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents