Which of the following is NOT part of CEH Scanning Methodology?

Which of the following is NOT part of CEH Scanning Methodology?

Which of the following is NOT part of CEH Scanning Methodology?

A.
Check for Live systems

B.
Check for Open Ports

C.
Banner Grabbing

D.
Prepare Proxies

E.
Social Engineering attacks

F.
Scan for Vulnerabilities

G.
Draw Network Diagrams



Leave a Reply 0

Your email address will not be published. Required fields are marked *