Skip to content

Certified Information Systems Security Professional – CISSP

  • Certified Information Systems Security Professional – CISSP

Tag: Question 178

Certified Information Systems Security Professional – CISSP – Question178

Which of the following command line tools can be used in the reconnaissance phase of a network vulnerability assessment?

A.
dig
B. ipconfig
C. ifconfig
D. nbstat

Correct Answer: A

Tagged Certified Information Systems Security Professional - CISSP, CHOICES, Question 178
Download all the questions as a printable PDF file from here
Exam Practice Tests

Please disable your adblocker or whitelist this site!