During a security assessment, why is enumeration considered a critical step after the initial scanning phase? It provides specific data required to maintain access to a compromised system. It helps in identifying live systems on the network only. It gathers more detailed data on security settings, existing accounts, and services running on systems.

icon
Related questions
Question

During a security assessment, why is enumeration considered a critical step after the initial scanning phase?

It provides specific data required to maintain access to a compromised system.

It helps in identifying live systems on the network only.

It gathers more detailed data on security settings, existing accounts, and services running on systems.

Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer