New Year Sale ! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM Exam CPEH-001 Topic 4 Question 104 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 104
Topic #: 4
[All CPEH-001 Questions]

Vulnerability mapping occurs after which phase of a penetration test?

Show Suggested Answer Hide Answer
Suggested Answer: C

The order should be Passive information gathering, Network level discovery, Host scanning and Analysis of host scanning.


Contribute your Thoughts:

Joanna
8 days ago
I think it's a combination of host scanning and network level discovery, as both are important for effective vulnerability mapping.
upvoted 0 times
...
Devorah
10 days ago
I believe it could also be after network level discovery, as understanding the network infrastructure is crucial for identifying vulnerabilities.
upvoted 0 times
...
Naomi
18 days ago
Vulnerability mapping? Isn't that like playing connect-the-dots with security flaws? #PenetrationPerplexed
upvoted 0 times
Beula
3 days ago
C) Analysis of host scanning
upvoted 0 times
...
Leslie
4 days ago
A) Host scanning
upvoted 0 times
...
Jaime
5 days ago
B) Passive information gathering
upvoted 0 times
...
Iraida
13 days ago
A) Host scanning
upvoted 0 times
...
...
Emelda
21 days ago
I agree with Moon, because vulnerability mapping requires identifying potential weaknesses on the target host.
upvoted 0 times
...
Moon
23 days ago
I think vulnerability mapping occurs after host scanning.
upvoted 0 times
...

Save Cancel