ExamGecko
Question list
Search
Search

Related questions











Question 345 - H12-711 discussion

Report
Export

The attacker searches the ports currently open by the attacked object by scanning the ports to determine the attack mode. In port scanning attacks, attackers usually use Port Scan attack software to initiate a series of TCP/UDP connections, and determine whether the host uses these ports to provide services according to the response packets. Such network probing is called _____ scanning.[fill in the blank]*

A.
port
Answers
A.
port
Suggested answer: A
asked 18/09/2024
Jason Coleman
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first