Vulnerability mapping occurs after which phase of a penetration test?
A.
Host scanning
B.
Passive information gathering
C.
Analysis of host scanning
D.
Network level discovery
Explanation:
The order should be Passive information gathering,Network level discovery,Host scanning and
Analysis of host scanning.
C