InterviewSolution
Saved Bookmarks
| 1. |
_______ is the tool used for this purpose.(a) Powersploit(b) Aircrack – ng(c) Snort(d) NmapThe question was asked by my school principal while I was bunking the class.Asked question is from Generic Steps for Security in section Cyber Security of Cyber Security |
|
Answer» The CORRECT option is (a) Powersploit |
|