Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
A Certified Ethical Hacker (CEH) follows a specific methodology for hacking a system. Which step comes after Reconnaissance in the CEH methodology?
Scanning
Maintaining Access
Gaining Access
Application attack
The 5 Phases are: 1. Reconnaissance/Footprinting, 2. Scanning, 3. Gaining Access, 4. Maintaining Access, and 5. Covering Tracks. So after Reconnaissance , the answer is scanning.
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.