Which is the first step followed by Vulnerability Scanners for scanning a network?
A . OS Detection
B . Firewall detection
C . TCP/UDP Port scanning
D . Checking if the remote host is alive
Answer: D
Which is the first step followed by Vulnerability Scanners for scanning a network?
A . OS Detection
B . Firewall detection
C . TCP/UDP Port scanning
D . Checking if the remote host is alive
Answer: D