QUESTION 13 Which is true about a ping sweep? O MAC addresses are pinged for availability. O A user must have administrative rights to scan each host. O ICMP queries each IP address on a host for a response. O SYN and ACK packets are used to query available hosts. QUESTION 14 Which of the following describes a security tool for an administrator to find the lease holder of an IP address? O RIR O ICANN O WHOIS O IANA QUESTION 15 Which of the following is true regarding FTPS? O tis the same thing as SFTP. O It can safely be used with Telnet. O It is a secure transmission method using SSL. O tis a secure transmission method using SSH.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
QUESTION 13
Which is true about a ping sweep?
MAC addresses are pinged for availability.
A user must have administrative rights to scan each host.
ICMP queries each IP address on a host for a response.
SYN and ACK packets are used to query available hosts.
QUESTION 14
Which of the following describes a security tool for an administrator to find the lease holder of an IP address?
RIR
ICANN
WHOIS
IANA
QUESTION 15
Which of the following is true regarding FTPS?
It is the same thing as SFTP.
It can safely be used with Telnet.
It is a secure transmission method using SSL.
It is a secure transmission method using SSH.
Transcribed Image Text:QUESTION 13 Which is true about a ping sweep? MAC addresses are pinged for availability. A user must have administrative rights to scan each host. ICMP queries each IP address on a host for a response. SYN and ACK packets are used to query available hosts. QUESTION 14 Which of the following describes a security tool for an administrator to find the lease holder of an IP address? RIR ICANN WHOIS IANA QUESTION 15 Which of the following is true regarding FTPS? It is the same thing as SFTP. It can safely be used with Telnet. It is a secure transmission method using SSL. It is a secure transmission method using SSH.
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Network Protocols
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education