![]() ![]() What must you obtain before you begin the ethical hacking process or penetration test on a live production network, even before performing the reconnaissance step?Ĥ. Which application can be used to perform a vulnerability assessment scan in the reconnaissance phase of the ethical hacking process?ģ. What is Zenmap typically used for? How is it related to Nmap? Describe a scenario in which you would use this type of application.Ģ.
0 Comments
Leave a Reply. |