A _____________ is a network scanning practice through which hackers can use to conclude to a point which IP address from a list of IP addresses is mapping to live hosts.
(a) ping-based hacking
(b) ping sweep
(c) ping-range
(d) pinging
I had been asked this question in a national level competition.
The doubt is from Fingerprinting in portion Cyber Security of Cyber Security