Which of the following commands should the penetration tester use to verify if this vulnerability exists?

Posted by: Pdfprep Category: SY0-501 Tags: , ,

A penetration tester is checking to see if an internal system is vulnerable to an attack using a remote listener.

Which of the following commands should the penetration tester use to verify if this vulnerability exists? (Choose two.)
A . tcpdump
B . nc
C . nmap
D . nslookup
E . tail
F . tracert

Answer: B,C

Leave a Reply

Your email address will not be published.