A penetration testing is preparing for a client engagement in which the tester must provide data that proves and validates the scanning tools' results.Which of the following is the best method for collecting this information?

A. Set up the scanning system's firewall to permit and log all outbound connections
B. Use a protocol analyzer to log all pertinent network traffic
C. Configure network flow data logging on all scanning system
D. Enable debug level logging on the scanning system and all scanning tools used.


Answer: B. Use a protocol analyzer to log all pertinent network traffic

Computer Science & Information Technology

You might also like to view...

An older type of serial interface connector.

What will be an ideal response?

Computer Science & Information Technology

Write a complete program for the problem described in Exercise 9.

What will be an ideal response?

Computer Science & Information Technology

It is acceptable to use uppercase letters in the ____.

A. root site folder B. file names C. site name D. folder names

Computer Science & Information Technology

A footnote consists of one or more lines at the bottom of each page.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology