1.

Which of the following comes after scanning phase in ethical hacking?(a) Scanning(b) Maintaining access(c) Reconnaissance(d) Gaining accessThis question was posed to me in semester exam.The doubt is from Generic Steps for Security topic in section Cyber Security of Cyber Security

Answer»

Right answer is (d) Gaining access

The EXPLANATION is: Gaining access is the next step after scanning. Once the scanning tools are used to LOOK for flaws in a SYSTEM, it is the next PHASE where the ethical hackers or penetration testers have to TECHNICALLY gain access to a network or system.



Discussion

No Comment Found

Related InterviewSolutions