Which of the following tools would the consultant use?

Posted by: Pdfprep Category: CFR-310 Tags: , ,

After a security breach, a security consultant is hired to perform a vulnerability assessment for a company’s web application.

Which of the following tools would the consultant use?
A . Nikto
B . Kismet
C . tcpdump
D . Hydra

Answer: A

Explanation:

Reference: https://www.scnsoft.com/blog/network-vulnerability-assessment-guide

Leave a Reply

Your email address will not be published.