Reconnaissance, Scanning, and Enumeration

Network scanning with Nmap, SMB security, cloud asset discovery, Netcat, and Sigma detection rules.

5 minutes 5 Questions

Reconnaissance, Scanning, and Enumeration are the first three critical phases of the cyber attack lifecycle, fundamental to the GIAC Certified Incident Handler (GCIH) body of knowledge. **Reconnaissance** is the initial phase where an attacker gathers information about a target without directly in…

Test mode:
More Reconnaissance, Scanning, and Enumeration questions
720 questions (total)