____________ scanning is a procedure to identify active hosts on your network.
(a) Network
(b) Port
(c) Vulnerability
(d) System
This question was addressed to me by my school teacher while I was bunking the class.
This intriguing question originated from Scanning Phase for Security topic in section Phases of Security of Cyber Security