In determining when it may be necessary to perform a credentialed scan against a system instead of a non-credentialed scan, which of the following requirements is MOST likely to influence this decision?
A. The scanner must be able to enumerate the host OS of devices scanned.
B. The scanner must be able to footprint the network.
C. The scanner must be able to check for open ports with listening services.
D. The scanner must be able to audit file system permissions
Answer: D. The scanner must be able to audit file system permissions
You might also like to view...
What is wrong with the following while repetition statement?
while ( z >= 0 ) sum += z; What will be an ideal response?
A(n) ________ relationship is a relationship that does not enforce referential integrity
A) calculated B) compared C) logical D) indeterminate
CSS stands for _____________________________.
Fill in the blank(s) with the appropriate word(s).
What are the criteria that determine the optimum size of a sector? Are these criteria permanent or do they change with time? What other developments in computing affect the answer to this question?
What will be an ideal response?