Which of the following is used to replicate attacks during a vulnerability assessment by providing a structure of exploits and monitoring tools?

A. replication image
B. assessment image
C. penetration framework
D. exploitation framework


Answer: D

Computer Science & Information Technology

You might also like to view...

Complete the following function for calculating the value of a number (base) raised to a power. Assume that power is positive.

int raiseTo_power (int base, int power) int ans; if (power == ______________ ) ans = ______________ ; else ans = ____________ *______________ ; return ans; }

Computer Science & Information Technology

In the URL shown in the accompanying figure, ____ is the name of the server that contains the file that is requested.

A. http B. wishtree C. www D. com

Computer Science & Information Technology

Critical Thinking Questions Case 8-1 ? Betty has a number of report templates at her disposal filed in folders to respond to her boss's requests. In order to know where to find a report that meets the needs of her manager, she first needs to know what category of report will satisfy the request. ?Betty's manager wants to just see the total figures of the sales without much of the supporting details. In which of the following folders is she likely to find this category of report?

A. ?Exception reports B. ?Summary reports C. ?Detail reports D. ?Control reports

Computer Science & Information Technology

Until a website is ____, you can only view the site on the storage device that contains it.

A. downloaded B. keyed C. published D. indexed

Computer Science & Information Technology