CEH Certified Ethical Hacker (312-50v9)
Question No. 1
Sandra has been actively scanning the client network on which she is doing a vulnerability assessment test.
While conducting a port scan she notices open ports in the range of 135 to 139.
What protocol is most likely to be listening on those ports?
Choose the correct option from the given list.
01 / 614