ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 32 Topic 4 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 32 Topic 4 Discussion

312-50v13 Exam Topic 4 Question 32 Discussion:
Question #: 32
Topic #: 4

John, a disgruntled ex-employee of an organization, contacted a professional hacker to exploit the organization. In the attack process, the professional hacker Installed a scanner on a machine belonging to one of the vktims and scanned several machines on the same network to Identify vulnerabilities to perform further exploitation. What is the type of vulnerability assessment tool employed by John in the above scenario?


A.

Proxy scanner


B.

Agent-based scanner


C.

Network-based scanner


D.

Cluster scanner


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.