The process of gathering information about a target system to find vulnerabilities that can be exploited is called _______.
- Debugging
- Encryption
- Hacking
- Scanning
The process of gathering information about a target system to find vulnerabilities is known as 'Scanning.' It's a critical phase in penetration testing and security assessment.
Loading...
Related Quiz
- A computer or network that is compromised and used as a launch point for malicious attacks against other systems is referred to as a _______.
- Company wants to analyze images to detect defects in products on an assembly line. Which type of neural network would be most suitable for this task?
- The methodology that emphasizes a phased approach to deploying ERP solutions, where each phase is a stepping stone for the next, is called _______.
- For HPC applications that require vast amounts of data processing in real-time, which memory characteristic is crucial?
- In IT project management, what technique visualizes tasks or activities on a board, allowing team members to track project progress?