Which three practices are commonly adopted when setting up a penetration testing lab environment? (Choose three.)
- use a honeypot for all tests run from the physical attack platforms
- create the penetration testing environment using virtual machines and virtual switches
- create the penetration testing environment using physical equipment and switches in order to route the packets freely
- ensure that when something crashes, it can be determined how and why it happened
- use an open environment to allow for free passage of attack packets to the target machines
- use a closed environment for all testing purposes
Explanation & Hints:
The following is a list of requirements for a typical penetration testing environment:
|