IST 294 Ethical Hacking Chapter 5 - Port Scanning
¡Supera tus tareas y exámenes ahora con Quizwiz!
Security testers and hackers use which of the following to determine the services running on a host and the vulnerabilities associated with these services? Zone transfers Zone scanning Encryption algorithms Port scanning
Port scanning