Banner grabbing and identifying open ports are performed during which of the following steps of hacking Linux?
a. Reconnaissance
b. Scanning and enumeration
c. Gaining access
d. Escalation of privilege
ANS: B
Computer Science & Information Technology
You might also like to view...
In what type of expression does an operator precede its operands?
a. postfix b. prefix c. outfix d. infix
Computer Science & Information Technology
____ software finds and removes malware from your computer and scans incoming and outgoing email messages to identify threats.
A. Antivirus B. Program C. Application D. Firewall
Computer Science & Information Technology