Whatarethefivestepsofethicalhacking? Duringthereconnaissancestepoftheattack,whatopenportswerediscovered by Zenmap? What services were running on those ports? WhatstepinthehackingattackprocessusesZenmap? Whatstepinthehackingattackprocessidentifiesknownvulnerabilities? Duringthevulnerabilityscan,youidentifiedavulnerableserviceintheLinux victim system. What was the name of the vulnerable service? Ifyouareamemberofasecuritypenetrationtestingteam,andyouidentify vulnerabilities and exploits, what should…