During a vulnerability assessment, what type of software can be used to search a system for port vulnerabilities?
A. threat scanner
B. vulnerability profiler
C. port scanner
D. application profiler
Answer: C
Computer Science & Information Technology
You might also like to view...
A ground object frequently requires reorientation.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
With a user story, storyboard-sketches, and transition diagram in hand, the program's ____ is done.
A. implementation B. design C. testing D. development
Computer Science & Information Technology
To assign a macro to a command button, first be sure the _____ tab is displayed.
A. Developer B. Insert C. Data D. View
Computer Science & Information Technology
When creating passwords for online accounts, you should _________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology