A penetration testing is preparing for a client engagement in which the tester must provide data that proves and validates the scanning tools' results.Which of the following is the best method for collecting this information?
A. Set up the scanning system's firewall to permit and log all outbound connections
B. Use a protocol analyzer to log all pertinent network traffic
C. Configure network flow data logging on all scanning system
D. Enable debug level logging on the scanning system and all scanning tools used.
Answer: B. Use a protocol analyzer to log all pertinent network traffic
You might also like to view...
A(n) site destination is the server space where you post your Web site files.
Answer the following statement true (T) or false (F)
?Identify the letter of the choice that best matches the sentence or definition.
A. ?It displays only the most important table content in a form such as a list. B. ?It is helpful when one needs to provide a lot of content in a compact form. C. ?It is used to save space in tables. D. ?It allows a webpage visitor to select items from a list of one or more choices. E. ?It is formatted with bold, centered text that indicates the purpose of the row or column. F. ?When this is applied, it makes the table appear to be using double lines between each table data cell. G. ?It is the intersection of a row and a column and usually contains data. H. ?It provides a structured way to collect information from webpage visitors. I. It is like a text control because it provides a text box for a single line of input. J. ?It is the text that describes the type of information to enter with an input control.