9D: Discover Cloud Vulnerabilities Flashcards
2.2 Given a scenario, perform active reconnaissance. 3.7 Given a scenario, perform post-exploitation techniques. 5.3 Explain use cases of the following tools during the phases of a penetration test.
1
Q
A guest operating system installed on a host computer using virtualization software (a hypervisor), such as Microsoft Hyper-V or VMware.
A
Virtual Machines
2
Q
An operating system virtualization deployment containing everything required to run a service, application, or microservice.
A
Container