Which of the following is a network vulnerability scanner? (Choose two.)
A) Nessus
B) Keylogger
C) Nbtstat
D) Nmap
E) pathping
A, D
Explanation: Examples of these vulnerability scanners include Nessus and Nmap (network mapper). Keylogger, Nbtstat, and pathping are not network vulnerability scanners.
Examples of these vulnerability scanners include Nessus and Nmap (network mapper). Keylogger, Nbtstat, and pathping are not network vulnerability scanners.
You might also like to view...
The ________ attribute sets the width of a text field
Fill in the blank(s) with correct word
A(n) ________ is just another name for an error in a program.
A. widget
B. bug
C. virus
D. algorithm
Team members adjust their behavior toward one another and begin to trust one another in the _____ stage.
a. forming b. storming c. norming d. performing
The ____ feature will help you guide your next anchor point by displaying a stretch line between anchor points, even before you click.
A. Elasticity B. Rubber Band C. Stretch Line D. Next Point