Malicious port scanning is a method of attack to determine which of the following?
A.
The physical cabling topology of a network
B.
The fingerprint of the operating system
C.
Computer name
D.
User IDs and passwords
Explanation:
Malicious port scanning is an attempt to find an unused port that the system won’t acknowledge.
Several programs now can use port scanning for advanced host detection and operating system
fingerprinting. With knowledge of the operating system, the hacker can look up known
vulnerabilities and exploits for that particular system.