Certified Ethical Hacker – CEH – 312-50 – Question511

While reviewing the result of scanning run against a target network you come across the following:

Which among the following can be used to get this output?


A.
A Bo2k system query.
B. nmap protocol scan
C. A sniffer
D. An SNMP walk

Correct Answer: D