CompTIA Security Plus Mock Test Q1259

A malicious user has collected the following list of information:
192.168.1.5 OpenSSH-Server_5.8
192.168.1.7 OpenSSH-Server_5.7
192.168.1.9 OpenSSH-Server_5.7
Which of the following techniques is MOST likely to gather this type of data?

A. Banner grabbing
B. Port scan
C. Host scan
D. Ping scan

Correct Answer: B
Section: Mixed Questions