PdfPrep.com

Which of the following tools would the consultant use?

After a security breach, a security consultant is hired to perform a vulnerability assessment for a company’s web application.

Which of the following tools would the consultant use?
A . Nikto
B . Kismet
C . tcpdump
D . Hydra

Answer: A

Explanation:

Reference: https://www.scnsoft.com/blog/network-vulnerability-assessment-guide

Exit mobile version