单项选择题
Which of the following would an attacker use to footprint a system?()
A.RADIUS
B.Password cracker
C.Port scanner
D.Man-in-the-middle attack
点击查看答案
相关考题
-
单项选择题
WhichofthefollowingtechnologiescanbeusedasameanstoisolateahostOSfromsometypesofsecuritythreats?()
A.Intrusion detection
B.Virtualization
C.Kiting
D.Cloning -
单项选择题
WhichofthefollowingdescribesastaticNAT?()
A.A static NAT uses a one to many mapping.
B.A static NAT uses a many to one mapping.
C.A static NAT uses a many to many mapping.
D.A static NAT uses a one to one mapping. -
单项选择题
WhichofthefollowingencryptionmethodsisoftenusedalongwithL2TP?()
A.S/MIME
B.SSH
C.3DES
D.IPSec
