You are in the discovery/reconnaissance phase of a penetration test. You decided to use automated scanning software to gather recon data on the network under test before you attempt to penetrate. Which of the following could you use to preform this task?
Attacks, Threats, and Vulnerabilities | |
Architecture and Design | |
Implementation | |
Operations and Incident Response | |
Governance, Risk, and Compliance |