What does an attacker use to determine which network ports are listening on a potential target device?
What does an attacker use to determine which network ports are listening on a potential target device?
A . man-in-the-middle
B . port scanning
C . SQL injection
D . ping sweep
Answer: B
Explanation:
Port scanning is a technique that an attacker uses to discover which network ports are open, closed, or filtered on a target device. By sending packets to different ports and observing the responses, an attacker can identify the services and applications running on the device, as well as potential vulnerabilities that can be exploited. Port scanning is a common reconnaissance activity that precedes an attack.
Reference: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) – Cisco, page 2-6; 200-201 CBROPS – Cisco, exam topic 1.1.a
Latest 200-201 Dumps Valid Version with 154 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund