Multiple Choice
Hackers identify possible victim computers by sending ________.
A) scouts
B) probe packets
C) exploits
D) Mocking Jays
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q11: Stateful firewalls are attractive because of their
Q24: In symmetric key encryption,a key must be
Q25: Which of the following is a criterion
Q26: How will an SPI firewall handle a
Q27: The password Velociraptor is adequately strong.
Q31: After a break-in,the first step usually is
Q32: Trojan horses can get onto computers by
Q33: A password that can be defeated by
Q34: The password Velociraptor can be defeated most
Q73: Malware programs that masquerade as system files