Passive assessments are a type of vulnerability assessment that uses network scanners to scan the network to identify the hosts, services, and vulnerabilities present in that network.

a. true
b. false


Answer: b. false

Computer Science & Information Technology

You might also like to view...

Answer the following questions true (T) or false (F)

1. True/False: A file that allows any record to be read independently of the others is known as a direct-access file. 2. True/False: The type of file that consists solely of standard keyboard characters is a binary file. 3. True/False: Text files are easier to create than binary files.

Computer Science & Information Technology

Axis properties are similar to ________.

a) XElement objects b) XPaths c) XML documents d) TreeNode structures

Computer Science & Information Technology

Which of the following Microsoft Office applications is used to create dynamic presentations to inform and persuade audiences?

A. Access B. Word C. PowerPoint D. Photoshop

Computer Science & Information Technology

What types of packets can be sent as part of a DoS attack?

A. SYN, HMAC and HTTP B. SYN, ICMP and HTML C. SYN, MD5 and HTTP D. SYN, ICMP and HTTP

Computer Science & Information Technology