What is probing used for?

A.
To induce a user into taking an incorrect action
B.
To use up all of a target’s resources
C.
To covertly listen to transmissions
D.
To give an attacker a road map of the network
Explanation:
The correct answer is “To give an attacker a road map of the network”. Probing is a procedure
whereby the intruder runs programs that scan the network to create a network map for later
intrusion. Answer “To induce a user into taking an incorrect action” is spoofing, c is the objective of a
DoS attack, and d is passive eavesdropping.