List of questions
Related questions
Question 94 - CS0-003 discussion
An attacker has just gained access to the syslog server on a LAN. Reviewing the syslog entries has allowed the attacker to prioritize possible next targets. Which of the following is this an example of?
A.
Passive network foot printing
B.
OS fingerprinting
C.
Service port identification
D.
Application versioning
Your answer:
0 comments
Sorted by
Leave a comment first