Which tool is used to exploit a target as well as perform information gathering?

A. Robtex
B. Metasploit
C. Th3Inspector
D. theHarvester

Ans: B. Metasploit

Computer Science & Information Technology

You might also like to view...

A(n) ________ list is a list of items preceded by small dots or other shapes

A) bulleted B) ordered C) numbered D) starred

Computer Science & Information Technology

Which of the following is not a category of the Standard Library algorithms?

a. mutating sequence algorithms b. sorting and related algorithms c. generalized numeric operations d. All of the above are categories of the Standard Library Algorithms.

Computer Science & Information Technology