Which of the following is the vulnerability scanner from which OpenVAS was developed?

a. OpenVAS Pro
b. Nessus
c. ISS Scanner
d. SuperScan


Answer: b. Nessus

Computer Science & Information Technology

You might also like to view...

Describe how input from an HTML FORM is retrieved in a Perl program.

What will be an ideal response?

Computer Science & Information Technology

In Excel if you want to create a worksheet with all elements as they will appear on the printed page, you should choose the ____ View.

A. Publishing Layout B. Print Layout C. Page Layout D. Notebook Layout

Computer Science & Information Technology

John loves the Internet and wants a career working on the machines that make the Internet work. He has completed both CompTIA A+ and Network+ certifications. Which of the following certifications would make a good next step?

A. Certified Cisco Network Associate B. Certified Cisco Network Professional C. CompTIA Security+ D. Microsoft Certified Systems Engineer

Computer Science & Information Technology

The valid values for the float property are top and bottom, indicating where to display (or float) the element.

a. true b. false

Computer Science & Information Technology