Passive assessments are a type of vulnerability assessment that uses network scanners to scan the network to identify the hosts, services, and vulnerabilities present in that network.
a. true
b. false
Answer: b. false
You might also like to view...
Answer the following questions true (T) or false (F)
1. True/False: A file that allows any record to be read independently of the others is known as a direct-access file. 2. True/False: The type of file that consists solely of standard keyboard characters is a binary file. 3. True/False: Text files are easier to create than binary files.
Axis properties are similar to ________.
a) XElement objects b) XPaths c) XML documents d) TreeNode structures
Which of the following Microsoft Office applications is used to create dynamic presentations to inform and persuade audiences?
A. Access B. Word C. PowerPoint D. Photoshop
What types of packets can be sent as part of a DoS attack?
A. SYN, HMAC and HTTP B. SYN, ICMP and HTML C. SYN, MD5 and HTTP D. SYN, ICMP and HTTP