Which of the following commands should the penetration tester use to verify if this vulnerability exists?
A penetration tester is checking to see if an internal system is vulnerable to an attack using a remote listener.
Which of the following commands should the penetration tester use to verify if this vulnerability exists? (Choose two.)
A . tcpdump
B . nc
C . nmap
D . nslookup
E . tail
F . tracert
Answer: B,C
Latest SY0-501 Dumps Valid Version with 1130 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments