Ethical Hacking

1. Explain in your own words what type of information can be obtained by using network scanning techniques and why it is an important intelligence gathering process.

 

 

 

2. Select one network scanning software tool and explain in detail how it works and how detects network vulnerabilities. Provide the site where you obtained your information and include that in your assignment write-up.