GIAC GISP Question Answer
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. In order to do so, he performs the following steps of the preattack phase successfully:
•Information gathering
•Determination of network range
•Identification of active systems
•Location of open ports and applications
Now, which of the following tasks should he perform next?
GIAC GISP Summary
- Vendor: GIAC
- Product: GISP
- Update on: Jul 25, 2025
- Questions: 659