What does an attacker use to determine which network ports are listening on a potential target device?

What does an attacker use to determine which network ports are listening on a potential target device?
A . man-in-the-middle
B . port scanning
C . SQL injection
D . ping sweep

Answer: B

Latest 200-201 Dumps Valid Version with 154 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments