单项选择题
A.Protocol analyzer
B.Vulnerability scanner
C.Port scanner
D.Penetration test
单项选择题 Anadministratorwantstoproactivelycollectinformationonattackersandtheirattemptedmethodsofgainingaccesstotheinternalnetwork.Whichofthefollowingwouldallowtheadministratortodothis?()
单项选择题 Whichofthefollowingwouldanattackerusetofootprintasystem?()
单项选择题 WhichofthefollowingtechnologiescanbeusedasameanstoisolateahostOSfromsometypesofsecuritythreats?()