EC
CEH Certified Ethical Hacker (312-50v9)
614 Questions
Question No. 1
Port scanning can be used as part of a technical assessment to determine network vulnerabilities. The TCP XMAS scan is used to identify listening ports on the targeted system.
If a scanned port is open, what happens?
Choose the correct option from the given list.
01 / 614