After a security breach, a security consultant is hired to perform a vulnerability assessment for a company’s web application.
Which of the following tools would the consultant use?
A . Nikto
B. Kismet
C. tcpdump
D. Hydra
Answer: A
Explanation:
Reference: https://www.scnsoft.com/blog/network-vulnerability-assessment-guide
Latest CFR-410 Dumps Valid Version with 100 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund