Which of the following is BEST utilized to identify common misconfigurations throughout the enterprise?

A. Vulnerability scanning
B. Port scanning
C. Penetration testing
D. Black box


Answer: A. Vulnerability scanning

Computer Science & Information Technology

You might also like to view...

Class-level ___________________ are used to add additional properties to an object.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

To eliminate the space between table cells, use the ___________ property.

a. border: none; b. border-style: 0; c. border-spacing: 0; d. cellspacing: 0;

Computer Science & Information Technology

An Intranet is a network of websites viewable by anyone with Internet access

Indicate whether the statement is true or false

Computer Science & Information Technology

When using msconfig to change the startup type, what startup selection loads basic devices and services only, and has no configurable options?

A. Normal startup B. Limited startup C. Diagnostic startup D. Selective startup

Computer Science & Information Technology