The second step in penetration testing is ____.

A. reporting
B. exploiting
C. examination
D. mapping

Answer: C

Computer Science & Information Technology

You might also like to view...

UTP, STP, and coax are associated with

A) Light transmission media B) Cable C) Wireless networking D) Radio frequency

Computer Science & Information Technology

Digital ___________ is a crime against or using digital media, computer technology, or related components; in other words, a computer is the source of the crime or the object of it.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology