header bg

Scan QR code or get instant email to install app

Question:

To converge more in-depth information on the targets, which stage of an ethical hack would the attacker actively apply tools and techniques?

A Scanning and enumeration.
explanation

Scanning and enumeration, the second of five phases of an ethical hack attempt, is the stage in which ethical hackers take the information collected in recon and actively employ tools and techniques to obtain additional in-depth information on the targets.

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*