ECSA/LPT EC-Council Module XXIX Database Penetration Testing Step1: Scan for Default Ports Used by the Database Use port scanning tools such as Nmap to scan for port used…