Find answers to your questions and expand your knowledge with IDNLearn.com. Our community is ready to provide in-depth answers and practical solutions to any questions you may have.

In the context of network security, how can an attacker enumerate port 139/445 to identify potential vulnerabilities in a system?
a) By analyzing the system's CPU usage patterns.
b) By monitoring the system's RAM allocation.
c) By using network scanning tools to probe open ports and services.
d) By examining the system's file system for unauthorized modifications.