contestada

Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs?.

Respuesta :

Maintaining access in the penetration testing life cycle is accomplished using rootkits or trojan horse programs.

The 5 levels of penetration testing life cycle. There are 5 penetration testing phases: reconnaissance, scanning, vulnerability evaluation, exploitation, and reporting.

A penetration check (pen test) is a certified simulated assault completed on a computer system to assess its safety. Penetration testers use identical equipment, techniques, and tactics as attackers to find and exhibit the commercial enterprise influences of weaknesses in a machine.

Learn more about penetration testing life cycle here:https://brainly.com/question/28341184
#SPJ4