Banner grabbing and identifying open ports are performed during which of the following steps of hacking Linux?

a. Reconnaissance
b. Scanning and enumeration
c. Gaining access
d. Escalation of privilege

ANS: B

Computer Science & Information Technology

You might also like to view...

In what type of expression does an operator precede its operands?

a. postfix b. prefix c. outfix d. infix

Computer Science & Information Technology

____ software finds and removes malware from your computer and scans incoming and outgoing email messages to identify threats.

A. Antivirus B. Program C. Application D. Firewall

Computer Science & Information Technology