Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
What occurs in the Enumeration phase of a Penetration Test
Attempt to gain user & privileged access.
Identify & document target information.
Map the environment profile to known vulnerabilities.
Gain Information though intrusive methods.
Enumeration is another name for phase 2, Vulnerability Discovery, where information is gained though intrusive methods. pg. 142. Official ISC2 Guide to the CISSP CBK. 4th Ed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.