Which scan examines the current security, using a passive method?

A. application scan
B. system scan
C. threat scan
D. vulnerability scan


Answer: D

Computer Science & Information Technology

You might also like to view...

An HTML document is composed of tags that represent distinct items in the Web page, such as a paragraph, the page heading, or even the entire body of the page itself.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The last element in a sequence can always be accessed with subscript _________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The __________ argument of the JOptionPane.showInputDialog method specifies the prompt that appears above an input dialog’s JTextField.

a) first b) second c) third d) fourth

Computer Science & Information Technology

Which of the following was not a result of the adoption of mechanical calculators?

a. Less demand for “superstars” who could rapidly compute sums by hand b. Higher productivity of bookkeepers c. Higher salaries of bookkeepers d. Proliferation of companies making calculators e. Feminization of bookkeeping

Computer Science & Information Technology