A penetration testing is preparing for a client engagement in which the tester must provide data that proves and validates the scanning tools' results. Which of the following is the best method for collecting this information?
A) Set up the scanning system's firewall to permit and log all outbound connections
B) Use a protocol analyzer to log all pertinent network traffic
C) Configure network flow data logging on all scanning system
D) Enable debug level logging on the scanning system and all scanning tools used.
Correct Answer:
Verified
Q138: Which of the following is the LEAST
Q139: Which of the following is the summary
Q140: A chief Financial Officer (CFO) has asked
Q141: A new intern in the purchasing department
Q142: A security guard has informed the Chief
Q144: A system administrator needs to implement 802.1x
Q145: A security program manager wants to actively
Q146: An auditor has identified an access control
Q147: Ann a security analyst is monitoring the
Q148: A company wants to host a publicly
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents