While looking for a single entry point where penetration testers can test the vulnerability, they use ______ phase of ethical hacking.
(a) Reconnaissance
(b) Scanning
(c) Gaining access
(d) Maintaining access
The question was asked in an interview for internship.
My doubt is from Generic Steps for Security in portion Cyber Security of Cyber Security
Select the correct answer from above options
Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,