Question 455:
A remote intruder wants to take inventory of a network so exploits can be researched. The intruder is looking for information about software versions on the network. Which of the following techniques is the intruder using?
Answer options:
A. Banner grabbing B. Port scanning C. Packet sniffing D. Virus scanning