Either of these commands will reveal processes listening on the port that's vulnerable by default:
$ sudo lsof -i :631
$ sudo fuser -v 631/tcp 631/udp
The wording of this post gives me the impression that it could exploited even if you don't have any such processes, if your system contacts a malicious or compromised print server. I would avoid browsing or using printers on unsafe networks until this is patched.
The port 631 process just makes it worse, by allowing someone else to initiate that contact remotely.