During which step of the scanning and fingerprinting process can the attacker use utilities such as Angry IP Scanner and Hping to perform a ping sweep?

a. Information gathering
b. Determining the network range
c. Identifying active machines
d. OS fingerprinting

ANS: C

Computer Science & Information Technology

You might also like to view...

A ______ center provides indirect support for an organization's mission but does not generate direct revenue

Fill in the blank(s) with correct word

Computer Science & Information Technology

How do the different versions of Windows Server 2016 handle CAL and core-based licenses?

What will be an ideal response?

Computer Science & Information Technology