A vulnerability scan is being conducted against a desktop system. The scan is looking for files, versions, and registry values known to be associated with system vulnerabilities. Which of the following BEST describes the type of scan being performed?

A. Non-intrusive
B. Authenticated
C. Credentialed
D. Active


Answer: C. Credentialed

Computer Science & Information Technology

You might also like to view...

Surrounding search terms with quotation marks (") limits a search to any words that sound like what is in the quotation marks

Indicate whether the statement is true or false

Computer Science & Information Technology

In Slide Sorter view, move a slide by clicking and dragging it to its new location in the presentation

Indicate whether the statement is true or false

Computer Science & Information Technology

What kind of a class might be considered to be "fragile"?

A. A built in class that is overloaded. B. A class that depends on being passed parameters from another method. C. A class that depends on field names from parent classes. D. A class that has no destructor method.

Computer Science & Information Technology

A ControlTip displays the message you typed for the ControlTip Button setting

Indicate whether the statement is true or false

Computer Science & Information Technology