Buscar
Estás en modo de exploración. debe iniciar sesión para usar MEMORY

   Inicia sesión para empezar


Por supuesto:

CISSP

» Iniciar este curso
(Practica preguntas similares gratis)
Pregunta:

Enumeration. This is the second step in the penetration test methodology and builds on the information gathered during the discovery phase and is specifically directed at the targeted systems, applications, and networks.

Autor: John Intindolo



Respuesta:

Which step of a penetration test involves performing port scans to discover information about a target? - Exploitation - Enumeration - Reconnaissance - Vulnerability mapping


0 / 5  (0 calificaciones)

1 answer(s) in total