Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.
D. Use of a vulnerability scanner to try to probe each port to verify which service is running is the best method of accurately identifying the services running on a victim host. Vulnerability scanners are automated tools that can detect the running services on a target host, even if they are running on non-standard ports. These scanners use a database of known vulnerabilities to probe the target host for known vulnerabilities and report any identified vulnerabilities.
i think word accurate is important as automated scanner as nessus can give false positive
upvoted 1 times
...
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
RichMe
3 weeks, 5 days agoDudette
1 year agotp9222
1 month, 1 week ago