Which of the following would Sara, a security administrator, utilize to identity a weakness within various applications without exploiting that weakness?

A. Protocol analyzer
B. Port scanner
C. Vulnerability scan
D. Penetration test


Ans: C. Vulnerability scan

Computer Science & Information Technology

You might also like to view...

Which computer first stored its operating system in ROM?

a. Apple I b. Apple II c. Lisa d. Macintosh

Computer Science & Information Technology

In an entity relationship diagram, bridge entities use a(n) ________ key

Fill in the blank(s) with correct word

Computer Science & Information Technology

Existing queries can be modified to create new queries

Indicate whether the statement is true or false

Computer Science & Information Technology

Critical Thinking QuestionsCase 5-2Eric had a small reference card that he keeps handy to remind him which MsgBoxButton arguments values translate to which buttons in the dialog box, but then he lost the card. He calls over to you for help in reminding him what values correspond to what.Eric wants your help in remembering which of the following options corresponds to a dialog box that alerts the user to an error and offers the OK and Cancel buttons. What do you tell him? a. MsgBox("User name is missing", 0 Or 32, "User Name Error")c. MsgBox("User name is missing", 1 Or 64, "User Name Error")b. MsgBox("User name is missing", 0 Or 48, "User Name Error")d. MsgBox("User name is missing", 1 Or 16, "User Name Error")

What will be an ideal response?

Computer Science & Information Technology