Comp TIA Security + Certification Questions Part 5

© examsiri.com
Question : 29 of 60
 
Marks: +1, -0
A remote intruder wants to take inventory of a network so exploits can be researched. The intruder is looking for information about software versions on the network. Which of the following techniques is the intruder using?
Go to Question: