Which of the following is NOT part of CEH Scanning Methodology?
A.
Check for Live systems
B.
Check for Open Ports
C.
Banner Grabbing
D.
Prepare Proxies
E.
Social Engineering attacks
F.
Scan for Vulnerabilities
G.
Draw Network Diagrams
Which of the following is NOT part of CEH Scanning Methodology?
Which of the following is NOT part of CEH Scanning Methodology?
A.
Check for Live systems
B.
Check for Open Ports
C.
Banner Grabbing
D.
Prepare Proxies
E.
Social Engineering attacks
F.
Scan for Vulnerabilities
G.
Draw Network Diagrams