A black hat hacker is enumerating a network and wants to remain covert during the process. The hacker initiates a vulnerability scan. Given the task at hand the requirement of being covert, which of the following statements BEST indicates that the vulnerability scan meets these requirements?
A) The vulnerability scanner is performing an authenticated scan.
B) The vulnerability scanner is performing local file integrity checks.
C) The vulnerability scanner is performing in network sniffer mode.
D) The vulnerability scanner is performing banner grabbing.
Correct Answer:
Verified
Q76: Before an infection was detected, several of
Q77: Which of the following are the MAIN
Q78: A systems administrator wants to protect data
Q79: A vulnerability scanner that uses its running
Q80: A manager wants to distribute a report
Q82: A company's AUP requires: Passwords must meet
Q83: An administrator is configuring access to information
Q84: To reduce disk consumption, an organization's legal
Q85: An in-house penetration tester is using a
Q86: A company is developing a new system
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents