Mangolinux167 Mangolinux167
  • 19-08-2019
  • Computers and Technology
contestada

During which phase of a hacker's five-step approach does the hacker scan a network to identify IP hosts, open ports, and services enabled on servers and workstations?

Respuesta :

Cetacea
Cetacea Cetacea
  • 21-08-2019

Answer: Reconnaissance

Explanation:Reconnaissance is referred as the initial/primary phase in which the attacker/ hacker puts the every effort to gain the knowledge about the target that is collecting facts about the DNS data, network records, IP address, range of IP etc.

It is the initial step done by the attackers to do the preparation of the hacking.It is done by the two phases that is active phase and the passive phase.

Answer Link

Otras preguntas

Can DDT be prevented? If so, how?
Which of these statements accurately describes Siddhartha Gautama, the founder of Buddhism? a. He saw a contradiction between the teachings of the Hindu sacred
who is a Nicaraguan national hero
Babylonians used a form of writing known as
ONE MORE first president of the USA
T Object] Socks are an important component of your exercise clothing because they __________. a. provide a good way to express your individuality b. increase
(c2- c - 1) ÷ c dividing polynomials
Write a sentences with the word cut
Briefly explain how you would talk to a friend you run into at a mall as opposed to how you would write a letter to a UNIVERSITY, requesting your statement of r
The length of a rectangle is 14 feet. The width is 6 feet. What is the perimeter of the rectangle? A. 20 feet B. 40 feet C. 64 feet D