Joe, a penetration tester, is tasked with testing the security robustness of the protocol between a mobile web application and a RESTful application server. Which of
the following security tools would be required to assess the security between the mobile web application and the RESTful application server? (Select TWO).
A.
Jailbroken mobile device
B.
Reconnaissance tools
C.
Network enumerator
D.
HTTP interceptor
E.
Vulnerability scanner
F.
Password cracker