A penetration tester has performed a pivot to a new Linux device on a different network.
The tester writes the following command:
for m in {1..254..1};do ping -c 1 192.168.101.$m; done
Which of the following BEST describes the result of running this command?
A . Port scan
B . Service enumeration
C . Live host identification
D . Denial of service
Answer: C