During which step of the scanning and fingerprinting process can the attacker use utilities such as Angry IP Scanner and Hping to perform a ping sweep?
a. Information gathering
b. Determining the network range
c. Identifying active machines
d. OS fingerprinting
ANS: C
Computer Science & Information Technology
You might also like to view...
A ______ center provides indirect support for an organization's mission but does not generate direct revenue
Fill in the blank(s) with correct word
Computer Science & Information Technology
How do the different versions of Windows Server 2016 handle CAL and core-based licenses?
What will be an ideal response?
Computer Science & Information Technology