Which term is used to identify active hosts, open ports, and unnecessary services on a host?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which term is used to identify active hosts, open ports, and unnecessary services on a host?

Explanation:
Scanning is the process of probing a network to map what is reachable and what services are exposed. By sending requests to a range of IPs and ports, you learn which hosts are active, which ports are open, and what services are listening on those ports. This information reveals the attack surface, including any unnecessary services that could be exploited, and sets up the next steps in assessment or exploitation. Reconnaissance is broader data gathering, not the specific discovery of live hosts and open ports. Maintaining access focuses on persistence after gaining entry, not on discovery. Information Assurance concerns protecting and securing information, not the discovery phase.

Scanning is the process of probing a network to map what is reachable and what services are exposed. By sending requests to a range of IPs and ports, you learn which hosts are active, which ports are open, and what services are listening on those ports. This information reveals the attack surface, including any unnecessary services that could be exploited, and sets up the next steps in assessment or exploitation.

Reconnaissance is broader data gathering, not the specific discovery of live hosts and open ports. Maintaining access focuses on persistence after gaining entry, not on discovery. Information Assurance concerns protecting and securing information, not the discovery phase.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy