week 11

In the video you viewed,in 3 to 4 paragraphs describe the concepts of Foot Printing and Scanning/Enumeration. 

We’ve examined hacking, and how they can break into systems, but can system administrators use Foot Printing and Scanning/Enumeration to enable them to make their companies networks stronger – and to minimize the damage done by hackers?

Leave a Reply

Your email address will not be published. Required fields are marked *