| Exam 200-201 | Question id=5978 | Host-based analysis |
What does an attacker use to determine which network ports are listening on a potential target device?
| A. |
man-in-the-middle | |
| B. |
port scanning | |
| C. |
SQL injection | |
| D. |
ping sweep |