WGU D483 DJN2 TASK 1 | SECURITY
OPERATIONS | LATEST UPDATE WITH
COMPLETE SOLUTION
Proxy - ANSWERS-What feature do web application scanners like Burp
Suite and ZAP utilize to intercept and inspect client-server traffic?
Nikto - ANSWERS-What command-line tool can be used to identify web
application and HTTP server vulnerabilities?
Application debuggers - ANSWERS-Which tool is used to look "inside"
of binaries to reveal how they work at an instruction-by-instruction
level?
ScoutSuite - ANSWERS-An open-source cloud vulnerability scanner
designed for AWS, Azure, and GCP auditing. It collects data from a
cloud platform using API calls. Then it compiles a report of all the
discovered objects, including VM instances, storage containers, IAM
accounts, data, firewall ACLs, and many others.
Burp Suite - ANSWERS-A proprietary interception proxy and web
application assessment tool.
Zed Attack Proxy (ZAP) - ANSWERS-An open-source interception proxy
and web application assessment tool.
OPERATIONS | LATEST UPDATE WITH
COMPLETE SOLUTION
Proxy - ANSWERS-What feature do web application scanners like Burp
Suite and ZAP utilize to intercept and inspect client-server traffic?
Nikto - ANSWERS-What command-line tool can be used to identify web
application and HTTP server vulnerabilities?
Application debuggers - ANSWERS-Which tool is used to look "inside"
of binaries to reveal how they work at an instruction-by-instruction
level?
ScoutSuite - ANSWERS-An open-source cloud vulnerability scanner
designed for AWS, Azure, and GCP auditing. It collects data from a
cloud platform using API calls. Then it compiles a report of all the
discovered objects, including VM instances, storage containers, IAM
accounts, data, firewall ACLs, and many others.
Burp Suite - ANSWERS-A proprietary interception proxy and web
application assessment tool.
Zed Attack Proxy (ZAP) - ANSWERS-An open-source interception proxy
and web application assessment tool.