Which of the following should be used to complete this task?

Sara, the Chief Information Officer (CIO), has requested an audit take place to determine what
services and operating systems are running on the corporate network. Which of the following
should be used to complete this task?

Sara, the Chief Information Officer (CIO), has requested an audit take place to determine what
services and operating systems are running on the corporate network. Which of the following
should be used to complete this task?

A.
Fingerprinting and password crackers

B.
Fuzzing and a port scan

C.
Vulnerability scan and fuzzing

D.
Port scan and fingerprinting

Explanation:



Leave a Reply 3

Your email address will not be published. Required fields are marked *


DJ

DJ

I don’t understand how Fingerprinting fits into this?

DJ

DJ

OK, I understand it now.

RobbieTheK

RobbieTheK

How fingerprint?