Register Now

Login

Lost Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

While looking for a single entry point where penetration testers can test the vulnerability, they use ______ phase of ethical hacking.

a) Reconnaissance
b) Scanning
c) Gaining access
d) Maintaining access

Answer: b
Explanation: Scanning is done to look for entry points in a network or system in order to launch an attack and check whether the system is penetrable or not.

Join The Discussion