❌ Used to determine the possible consequences of successful attacks on the network.
❌ Used to find weaknesses and misconfigurations on network systems.
❌ Used to discover available resources on the network.
❌ Used to detect and report changes made to systems
Drag and drop to complete the text.
Penetration testing
Penetration testing
Vulnerability scanning
Vulnerability scanning
Network scanning
Network scanning