Answer:
Once the hosts and port have been mapped by scanning the network, the final footprinting step can be performed. This is called Stack fingerprinting.
Previous Question | Next Question |
What is Brute Force Hack? | Define footprinting in ethical hacking? |