GAQM CEH-001 Question Answer
Vulnerability mapping occurs after which phase of a penetration test?
Host scanning
Passive information gathering
Analysis of host scanning
Network level discovery
The order should be Passive information gathering, Network level discovery, Host scanning and Analysis of host scanning.
TESTED 31 Aug 2025
Copyright © 2014-2025 ACE4Sure. All Rights Reserved