In penetration testing, different ____________________ are used to gather data that will support the attack.
Fill in the blank(s) with the appropriate word(s).
probes
Computer Science & Information Technology
You might also like to view...
Which type of address uses 128 bits?
A) LC B) IPv6 C) MAC D) IPv4
Computer Science & Information Technology
What are the three structures in structured programming?
a. input, process, output b. sequence, selection, iteration c. heading, detail, summary d. initialization, process, termination e. None of the above
Computer Science & Information Technology