What would be the name of this tool?

John is using a special tool on his Linux platform that has a database containing signatures to be
able to detect hundreds of vulnerabilities in UNIX, Windows, and commonly used web CGI/ASPX
scripts. Moreover, the database detects DDoS zombies and Trojans as well. What would be the
name of this tool?

John is using a special tool on his Linux platform that has a database containing signatures to be
able to detect hundreds of vulnerabilities in UNIX, Windows, and commonly used web CGI/ASPX
scripts. Moreover, the database detects DDoS zombies and Trojans as well. What would be the
name of this tool?

A.
hping2

B.
nessus

C.
nmap

D.
make



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Ghost Man

Ghost Man

B is the Right Ans.