Question 24:
What does an attacker use to determine which network ports are listening on a potential target device?
Answer options:
A. man-in-the-middle B. port scanning C. SQL injection D. ping sweep
Answer correct:
B