CySA+ CS0-001 – Q. 370

0
26

A hacker issued a command and received the following response:

Which of the following describes what the hacker is attempting?

A. Penetrating the system
B. Performing a zombie scan
C. OS fingerprinting
D. Topology discovery