Which tool is used to exploit a target as well as perform information gathering?
A. Robtex
B. Metasploit
C. Th3Inspector
D. theHarvester
Ans: B. Metasploit
Computer Science & Information Technology
You might also like to view...
A(n) ________ list is a list of items preceded by small dots or other shapes
A) bulleted B) ordered C) numbered D) starred
Computer Science & Information Technology
Which of the following is not a category of the Standard Library algorithms?
a. mutating sequence algorithms b. sorting and related algorithms c. generalized numeric operations d. All of the above are categories of the Standard Library Algorithms.
Computer Science & Information Technology