An administrator would like to scan for open ports on the subnet and determine if any vulnerable
applications are listening. Which of the following tools would the administrator MOST likely use?
A.
Ping
B.
Nessus
C.
IMAP
D.
Telnet
An administrator would like to scan for open ports on the subnet and determine if any vulnerable
applications are listening. Which of the following tools would the administrator MOST likely use?
An administrator would like to scan for open ports on the subnet and determine if any vulnerable
applications are listening. Which of the following tools would the administrator MOST likely use?
A.
Ping
B.
Nessus
C.
IMAP
D.
Telnet