Logical Operations CyberSec First Responder CFR-210 Question # 19 Topic 2 Discussion

Logical Operations CyberSec First Responder CFR-210 Question # 19 Topic 2 Discussion

CFR-210 Exam Topic 2 Question 19 Discussion:
Question #: 19
Topic #: 2

Which of the following techniques allows probing firewall rule sets and finding entry points into a targeted system or network?


A.

Distributed checksum clearinghouse


B.

Firewall fingerprinting


C.

Network enumeration


D.

Packet crafting


Get Premium CFR-210 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.