List of questions
Related questions
Question 345 - H12-711 discussion
The attacker searches the ports currently open by the attacked object by scanning the ports to determine the attack mode. In port scanning attacks, attackers usually use Port Scan attack software to initiate a series of TCP/UDP connections, and determine whether the host uses these ports to provide services according to the response packets. Such network probing is called _____ scanning.[fill in the blank]*
A.
port
Your answer:
0 comments
Sorted by
Leave a comment first