Computers and Technology

Lab Assessment Questions 1. What are the five steps of ethical hacking?
2. During the reconnaissance step of the attack, what open ports were discovered by Zenmap? What services were running on those ports?
3. What step in the hacking attack process uses Zenmap?
4. What step in the hacking attack process identifies known vulnerabilities?
5. During the vulnerability scan, you identified a vulnerable service in the Linux victim system. What was the name of the vulnerable service?
6. If you are a member of a security penetration testing team, and you identify vulnerabilities and exploits, what should you obtain from the owners of the system in question prior to compromising and exploiting the known vulnerability?

answer
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 23.06.2019 15:20, headshotplayzcod
In a game with three frames, where will the objects on layer 1 appear? a. next to the play area b. in the middle of the game c. behind everything else d. in front of everything else
Answers: 1
image
Computers and Technology, 23.06.2019 22:00, bb1593
Jackson, who works in the finance department of a company, is holding a seminar for other employees on how to file taxes. only three employees sign up to attend the seminar. which device can he use to share his presentation with a group of three employees?
Answers: 1
image
Computers and Technology, 24.06.2019 10:50, latresyn
In 2009 to 2010, how many social network users were reported as being victims of online abuse? a. 1 in 10 b. 100% c.1 in 100 d. 50%
Answers: 2
image
Computers and Technology, 24.06.2019 23:00, person76
Systolic pressure is a measure of blood pressure when the ventricles relax and fil with blood ture or false
Answers: 1
Do you know the correct answer?
Lab Assessment Questions 1. What are the five steps of ethical hacking?
2. During the reconna...

Questions in other subjects:

Konu
English, 14.01.2020 19:31