header bg

Question:

For scanning a network, which of the following is the first step followed by Vulnerability Scanners?

A Checking if the remote host is alive
Explaination