GAQM CEH-001 Question Answer
Vulnerability mapping occurs after which phase of a penetration test?
Host scanning
Passive information gathering
Analysis of host scanning
Network level discovery
The order should be Passive information gathering, Network level discovery, Host scanning and Analysis of host scanning.
TESTED 01 Feb 2026
Copyright © 2014-2026 ACE4Sure. All Rights Reserved