Running a port scan against the target system. -a tcp/ip network makes many of the ports available to outside users through the router. these ports will respond in a predictable manner when queried. an attacker can systematically query a network to determine which services and ports are open. this process is called port scanning, and it can reveal a great deal about your network. port scans can be performed both internally and externally. many routers, unless configured appropriately, will let all of the protocols pass through them. reference: mike pastore and emmett dulaney, security+ study guide, 2nd edition, alameda, sybex, 2004, p 69