What does an attacker use to determine which network ports are listening on a potential target device?

What does an attacker use to determine which network ports are listening on a potential target device?
A . man-in-the-middle
B . port scanning
C . SQL injection
D . ping sweep

Answer: B

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments