Certified Ethical Hacker – CEH – 312-50 – Question083

Which of the following techniques does a vulnerability scanner use in order to detect a vulnerability on a target service?


A.
Port scanning
B. Banner grabbing
C. Injecting arbitrary data
D. Analyzing service response

Correct Answer: D