Question: Heather is performing a penetration test. She has gathered a lot of valuable information about her target already. Heather has used some hacking tools to
Heather is performing a penetration test. She has gathered a lot of valuable information about her target already. Heather has used some hacking tools to determine that, on her target network, a computer named Production Workstation has port open. Which step in the ethical hacking methodology is Heather performing?
Question options:
Gain access
Maintain access
Scanning and enumeration
Reconnaissance
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
