Which of the following techniques does a vulnerability scanner use in order to detect a vulnerability on a target service? A. Port scanning B. Banner grabbing C. Injecting arbitrary data D. Analyzing service response Suggested Answer: D This question is in 312-50V9 EC-Council Certified Ethical Hacker v9 Exam For getting EC-Council Certified Ethical Hacker (CEH) Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by EC-Council. Trademarks, certification & product names are used for reference only and belong to EC-Council. The website does not contain actual questions and answers from EC-Council's Certification Exams.
Please login or Register to submit your answer