اختبار شهادة Certified Ethical Hacker (CEH) V13

السؤال 157 من 180

كل الأسئلة

John hired a professional hacker. The attacker installed a scanner on a victim’s machine and then used it to scan other machines on the same network to identify vulnerabilities for further exploitation. What type of vulnerability assessment tool was used?

الخيارات

  • A Proxy scanner
  • B Agent-based scanner
  • C Network-based scanner
  • D Cluster scanner

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.