Which of the following types of vulnerability assessment sniffs the traffic present on the network to identify the active systems, network services, applications, and vulnerabilities?

A. Active assessment
B. Passive assessment
C. Credentialed assessment
D. Distributed assessment


Answer: B. Passive assessment

Sociology

You might also like to view...

Land, tools, equipment, factories, modes of transportation, and labor are

a. owned by the proletariat. c. essential to providing services. b. part of the means of production. d. owned by the intellectual classes.

Sociology

Which theory focuses on how the parts of a society work together in ensuring the survival of the whole?

A) the structuralfunctional perspective B) the conflict perspective C) the social exchange perspective D) the symbolic interaction perspective

Sociology

Sociologists applying a _____ framework to the study of consumerism would primarily focus on a microlevel analysis of people's face-to-face interactions

a. conflict b. functionalist c. symbolic interactionist d. postmodern

Sociology

Sociologist, Robin DiAngelo coined the concept __________ to refer to the defensiveness whites often feel or take up when confronted with discussions of racial inequality or injustice.

a. snowflakes b. white fragility c. white privilege d. withdrawal

Sociology