Which of the following would Sara, a security administrator, utilize to identity a weakness within various applications without exploiting that weakness?
A. Protocol analyzer
B. Port scanner
C. Vulnerability scan
D. Penetration test
Ans: C. Vulnerability scan
You might also like to view...
Which computer first stored its operating system in ROM?
a. Apple I b. Apple II c. Lisa d. Macintosh
In an entity relationship diagram, bridge entities use a(n) ________ key
Fill in the blank(s) with correct word
Existing queries can be modified to create new queries
Indicate whether the statement is true or false
Critical Thinking QuestionsCase 5-2Eric had a small reference card that he keeps handy to remind him which MsgBoxButton arguments values translate to which buttons in the dialog box, but then he lost the card. He calls over to you for help in reminding him what values correspond to what.Eric wants your help in remembering which of the following options corresponds to a dialog box that alerts the user to an error and offers the OK and Cancel buttons. What do you tell him? a. MsgBox("User name is missing", 0 Or 32, "User Name Error")c. MsgBox("User name is missing", 1 Or 64, "User Name Error")b. MsgBox("User name is missing", 0 Or 48, "User Name Error")d. MsgBox("User name is missing", 1 Or 16, "User Name Error")
What will be an ideal response?