Which is the first step followed by Vulnerability Scanners for scanning a network?
A . TCP/UDP Port scanning
B . Firewall detection
C . OS Detection
D . Checking if the remote host is alive
Answer: D
Which is the first step followed by Vulnerability Scanners for scanning a network?
A . TCP/UDP Port scanning
B . Firewall detection
C . OS Detection
D . Checking if the remote host is alive
Answer: D