9D: Discover Cloud Vulnerabilities Flashcards

2.2 Given a scenario, perform active reconnaissance. 3.7 Given a scenario, perform post-exploitation techniques. 5.3 Explain use cases of the following tools during the phases of a penetration test.

1
Q

A guest operating system installed on a host computer using virtualization software (a hypervisor), such as Microsoft Hyper-V or VMware.

A

Virtual Machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An operating system virtualization deployment containing everything required to run a service, application, or microservice.

A

Container

How well did you know this?
1
Not at all
2
3
4
5
Perfectly