Question

Once an attacker has found available IP addresses, they may then run ____________________ software to find a system on which a key port is open or not in use.

Answer

This answer is hidden. It contains 13 characters.