In penetration testing, different ____________________ are used to gather data that will support the attack.

Fill in the blank(s) with the appropriate word(s).

probes

Computer Science & Information Technology

You might also like to view...

Which type of address uses 128 bits?

A) LC B) IPv6 C) MAC D) IPv4

Computer Science & Information Technology

What are the three structures in structured programming?

a. input, process, output b. sequence, selection, iteration c. heading, detail, summary d. initialization, process, termination e. None of the above

Computer Science & Information Technology