Certified Ethical Hacker 312-50v10 – Question058

Which is the first step followed by Vulnerability Scanners for scanning a network?


A.
TCP/UDP Port scanning
B. Firewall detection
C. OS Detection
D. Checking if the remote host is alive

Correct Answer: D