What type of software application should network administrators routinely use to verify the security of their network and check for any weaknesses?

a. Honey pot
b. Posture monitor
c. Profile scanner
d. Vulnerability scanner


Answer: d. Vulnerability scanner

Computer Science & Information Technology

You might also like to view...

What is a private network in Hyper-V and why might you use one?

What will be an ideal response?

Computer Science & Information Technology

When using Expression Builder, you can ________ an item in the Expression Categories or Expression Values sections to automatically add it to the expression box

Fill in the blank(s) with correct word

Computer Science & Information Technology

____________________ connections are internal devices that connect hard disks, CD-ROM drives, and other peripherals mounted inside the PC.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can plot two data sets on different axes by creating a combination chart, selecting the ____________________ checkbox next to one of the data series, then clicking OK.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology