A(n) ____ vulnerability scanner listens in on the network and identifies vulnerable versions of both server and client software.
A. stealth
B. silent
C. passive
D. encapsulated
Answer: C
Computer Science & Information Technology
You might also like to view...
Which of the following should be added before a number if you want to enter a number as a label, for example, as a telephone number?
A. slash B. double quote C. apostrophe D. pound
Computer Science & Information Technology
What is the command used to check the interface status?
What will be an ideal response?
Computer Science & Information Technology
A ________ network can operate without a server.
A) unsecured B) peer-to-peer C) wired D) wireless
Computer Science & Information Technology
You cannot create new brushes.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology