Which of the following is a network vulnerability scanner? (Choose two.)

A) Nessus
B) Keylogger
C) Nbtstat
D) Nmap
E) pathping


A, D
Explanation: Examples of these vulnerability scanners include Nessus and Nmap (network mapper). Keylogger, Nbtstat, and pathping are not network vulnerability scanners.
Examples of these vulnerability scanners include Nessus and Nmap (network mapper). Keylogger, Nbtstat, and pathping are not network vulnerability scanners.

Computer Science & Information Technology

You might also like to view...

The ________ attribute sets the width of a text field

Fill in the blank(s) with correct word

Computer Science & Information Technology

A(n) ________ is just another name for an error in a program.

A. widget
B. bug
C. virus
D. algorithm

Computer Science & Information Technology

Team members adjust their behavior toward one another and begin to trust one another in the _____ stage.

a. forming b. storming c. norming d. performing

Computer Science & Information Technology

The ____ feature will help you guide your next anchor point by displaying a stretch line between anchor points, even before you click.

A. Elasticity B. Rubber Band C. Stretch Line D. Next Point

Computer Science & Information Technology