Which of the following network vulnerability scan indicators BEST validates a successful, active scan?

A. The scan job is scheduled to run during off-peak hours.
B. The scan output lists SQL injection attack vectors.
C. The scan data identifies the use of privileged-user credentials.
D. The scan results identify the hostname and IP address.


Answer: B. The scan output lists SQL injection attack vectors.

Computer Science & Information Technology

You might also like to view...

Files static method ________ receives a Path and returns a boolean indicating whether that Path represents a directory on disk.

a. isDiskDirectory b. isDirectory c. isFileDirectory d. isPath

Computer Science & Information Technology

?A car performs a(n) _____ called OPERATE WIPERS when it is sent a message with the wiper control.

A. ?method B. ?role C. ?command D. ?objective

Computer Science & Information Technology

What are the three tenets of the CIA triad, and how do they provide assurances that data will be protected?

What will be an ideal response?

Computer Science & Information Technology

Turning on ________ enables you to work with the content control properties in a document

Fill in the blank(s) with correct word

Computer Science & Information Technology