A company hires outside security experts to evaluate the security status of the corporate network. All of the company's IT resources are outdated and prone to crashing. The company requests that all testing be performed in a way which minimizes the risk of system failures. Which of the following types of testing does the company want performed?

A. Penetration testing
B. WAF testing
C. Vulnerability scanning
D. White box testing


Answer: C. Vulnerability scanning

Computer Science & Information Technology

You might also like to view...

iPhones let you add SD flash cards

Indicate whether the statement is true or false

Computer Science & Information Technology

ONI's findings indicate that many countries engage in Internet ____________________ (intercepting and removing messages to prevent them from reaching their destination), and some do so extensively.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Why do you think Susan prefers storing the inventory data in Access? What are the advantages to doing so? What are the disadvantages?

What will be an ideal response?

Computer Science & Information Technology

A(n) ____________________ should be subtle enough to provide contrast with the page text.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology