Which of the following describes what the hacker is attempting?

Posted by: Pdfprep Category: CS0-001 Tags: , ,

A hacker issued a command and received the following response:

Which of the following describes what the hacker is attempting?
A . Penetrating the system
B . Performing a zombie scan
C . OS fingerprinting
D . Topology discovery

Answer: A

Leave a Reply

Your email address will not be published.