A. It is a software used to scan system for attack
B. It is a software application designed to probe a server or host for open ports
C. It is software used to scan system for introducing attacks by brute force
D. None of the mentioned
A. Tcp scanning
B. Syn scanning
C. Udp scanning
D. System scanning
A. Ack scanning
B. Window scanning
C. Igmp scan
D. Fin scanning
A. Are specific system which are designed to attack by manufacturer
B. They are network of known hacking group
C. These systems are previously compromised independent systems
D. None of the mentioned
A. It is attacked to block traffic of network
B. It is attacked to harm contents stored in hdd by worm spawn processes
C. It is an attempt to make a machine or network resource unavailable
D. None of the mentioned
A. We can stop dos attack completely
B. By upgrading os vulnerability we can stop dos attack to some extent
C. Dos attack has to be stopped at network level
D. Such attack can last for hours