Select the vulnerability scan type that will use only the available information to hypothesize the status of the vulnerability.

A. active
B. non-intrusive
C. passive
D. intrusive


Answer: B

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. A partially filled array is normally accompanied by an integer variable that indicates the number of items actually stored in the array. 2. A search algorithm is a technique for scanning through an array and rearranging its contents in some specific order. 3. It is critical to use reference parameters in any method that must be able to change the values of the items passed to it as arguments. 4. The primary advantage of the binary search algorithm is simplicity, but its primary disadvantage, however, is inefficiency. 5. A two-dimensional array can be thought of as having rows and columns of elements.

Computer Science & Information Technology

Which of the following is NOT true when considering which fields to index?

A) Indexes can slow down searches and queries, but they can accelerate performance when you add or update data. B) You cannot index a field whose data type is an OLE Object, Hyperlink, Memo, or Attachment. C) You should index a field when the data is generally unique and when there are more different entries than duplicate entries. D) You should index a field when you plan to frequently search or sort it.

Computer Science & Information Technology

When creating a program in Visual Studio, the ____ is the window that you use to build the program and which will display on your screen when the program is executed.

A. Windows Form object B. Windows Screen object C. Windows Program object D. Windows Desktop object

Computer Science & Information Technology

Which of the following is the path to the Conditional Formatting button?

A. (Home tab | Editing group) B. (Styles tab | Formatting group) C. (Formatting tab | Styles group) D. (Home tab | Styles group)

Computer Science & Information Technology