Correct Answer: Ports
Explanation:
Note: This Question is unanswered, help us to find answer for this one
Ethical Hacking Skill Assessment
Your Skill Level: Poor
Retake Quizzes to improve it
More Ethical Hacking MCQ Questions
Hackers use __________ to execute arbitrary scripts through the web browser.
With ____, you can have your desktop computer or laptop start in both windows and linux.
_____ is a protocol for securely accessing a remote computer.
In relation to ethical hacking. which of the following options refers to a method. which is used for determining the type of operating system running on a remote computer?
Which of the following is the syntax of ping sweep using Nmap for ICMP scanning?
Which is correct about stealth scan or half-Open scan? i) With stealth scan, the chances of triggering the detection mechanism are high. ii) Stealth scan is less reliable as compared to full-Open scan.
Which of the given types of viruses has the following characteristics?