Exam 200-201 | Question id=5978 | Host-based analysis |
What does an attacker use to determine which network ports are listening on a potential target device?
A. |
man-in-the-middle | |
B. |
port scanning | |
C. |
SQL injection | |
D. |
ping sweep |