Which of the following techniques does a vulnerability scanner use in order to detect a vulnerability on a target service?
A. Port scanning
B. Banner grabbing
C. Injecting arbitrary data
D. Analyzing service response
A. Port scanning
B. Banner grabbing
C. Injecting arbitrary data
D. Analyzing service response