During a vulnerability assessment, what type of software can be used to search a system for port vulnerabilities?

A. threat scanner
B. vulnerability profiler
C. port scanner
D. application profiler


Answer: C

Computer Science & Information Technology

You might also like to view...

A ground object frequently requires reorientation.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

With a user story, storyboard-sketches, and transition diagram in hand, the program's ____ is done.

A. implementation B. design C. testing D. development

Computer Science & Information Technology

To assign a macro to a command button, first be sure the _____ tab is displayed.

A. Developer B. Insert C. Data D. View

Computer Science & Information Technology

When creating passwords for online accounts, you should _________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology