What does an attacker use to determine which network ports are listening on a potential target device?
A . man-in-the-middle
B . port scanning
C . SQL injection
D . ping sweep
Answer: B
What does an attacker use to determine which network ports are listening on a potential target device?
A . man-in-the-middle
B . port scanning
C . SQL injection
D . ping sweep
Answer: B