A vulnerability scan is being conducted against a desktop system. The scan is looking for files, versions, and registry values known to be associated with system vulnerabilities. Which of the following BEST describes the type of scan being performed?
A. Non-intrusive
B. Authenticated
C. Credentialed
D. Active
Answer: C. Credentialed
You might also like to view...
Surrounding search terms with quotation marks (") limits a search to any words that sound like what is in the quotation marks
Indicate whether the statement is true or false
In Slide Sorter view, move a slide by clicking and dragging it to its new location in the presentation
Indicate whether the statement is true or false
What kind of a class might be considered to be "fragile"?
A. A built in class that is overloaded. B. A class that depends on being passed parameters from another method. C. A class that depends on field names from parent classes. D. A class that has no destructor method.
A ControlTip displays the message you typed for the ControlTip Button setting
Indicate whether the statement is true or false