Which of the following tools can he use to accomplish his task?

John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He has successfully completed the following steps of the
preattack phase:
·Information gathering
·Determining network range
·Identifying active machines
·Finding open ports and applications
·OS fingerprinting
·Fingerprinting services
Now John wants to perform network mapping of the We-are-secure network. Which of the
following tools can he use to accomplish his task?
Each correct answer represents a complete solution. Choose all that apply.

John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He has successfully completed the following steps of the
preattack phase:
·Information gathering
·Determining network range
·Identifying active machines
·Finding open ports and applications
·OS fingerprinting
·Fingerprinting services
Now John wants to perform network mapping of the We-are-secure network. Which of the
following tools can he use to accomplish his task?
Each correct answer represents a complete solution. Choose all that apply.

A.
Traceroute

B.
NeoTrace

C.
Cheops

D.
Ettercap

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *