Watch this video on YouTube
Which is the first action performed by Vulnerability Scanners for scanning a network?