A(n) ____ vulnerability scanner listens in on the network and identifies vulnerable versions of both server and client software.

A. stealth
B. silent
C. passive
D. encapsulated


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following should be added before a number if you want to enter a number as a label, for example, as a telephone number?

A. slash B. double quote C. apostrophe D. pound

Computer Science & Information Technology

What is the command used to check the interface status?


What will be an ideal response?

Computer Science & Information Technology

A ________ network can operate without a server.

A) unsecured B) peer-to-peer C) wired D) wireless

Computer Science & Information Technology

You cannot create new brushes.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology