Which of the following is the best way an attacker can passively learn about technologies used in an organization?
which of the following commands will start the Nessus client in the background so that the Nessus server can be configured?