Comp TIA Security + Certification Questions Part 5
© examsiri.com
Question : 29 of 60
Marks:
+1,
-0
A remote intruder wants to take inventory of a network so exploits can be researched. The intruder is looking for information about software versions on the network. Which of the following techniques is the intruder using?
Go to Question: