Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM Exam CPEH-001 Topic 2 Question 81 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 81
Topic #: 2
[All CPEH-001 Questions]

Vulnerability mapping occurs after which phase of a penetration test?

Show Suggested Answer Hide Answer
Suggested Answer: C

The order should be Passive information gathering, Network level discovery, Host scanning and Analysis of host scanning.


Contribute your Thoughts:

Amina
6 months ago
I believe vulnerability mapping happens after network level discovery, as we need to understand the network infrastructure first.
upvoted 0 times
...
Daron
7 months ago
But shouldn't it be after analyzing the results of host scanning to map the vulnerabilities?
upvoted 0 times
...
Gwenn
7 months ago
I agree, because after scanning for hosts, we can identify vulnerabilities on those hosts.
upvoted 0 times
...
Yoko
7 months ago
I think vulnerability mapping occurs after host scanning.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77