Which of the following is NOT part of CEH Scanning Methodology?

Which of the following is NOT part of CEH Scanning Methodology?

Which of the following is NOT part of CEH Scanning Methodology?

A.
Check for Live systems

B.
Check for Open Ports

C.
Banner Grabbing

D.
Prepare Proxies

E.
Social Engineering attacks

F.
Scan for Vulnerabilities

G.
Draw Network Diagrams



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Sean

Sean

certainly like your web-site but you have to check the spelling on several
of your posts. Several of them are rife with spelling problems
and I find it very troublesome to tell the reality nevertheless I’ll
certainly come again again.