1. A Certified Ethical Hacker follows a specific methodology for testing a system. Which step comes after footprinting in the CEH methodology?
D. Application attack
2. You’ve been hired as part of a pen test team. During the in brief, you learn the client wants the pen test attack to simulate a normal user who finds ways to elevate privileges and create attacks. Which test type does the client want?
A. White box
B. Gray box
C. Black box
3. Which of the following is true regarding an ethical hacker?
A. The ethical hacker points out vulnerabilities, but does not ...