A security analyst has set up a network tap to monitor network traffic for vulnerabilities. Which of the following techniques would BEST describe the approach the analyst has taken?

A. Compliance scanning
B. Credentialed scanning
C. Passive vulnerability scanning
D. Port scanning


Answer: D. Port scanning

Computer Science & Information Technology

You might also like to view...

What is contrast?

What will be an ideal response?

Computer Science & Information Technology

Gifford's quorum consensus replication is in use at servers X, Y and Z which all hold replicas of data items A and B. The initial values of all replicas of A and B are 100 and the votes for A and B are 1 at each of X, Y and Z. Also R = W = 2 for both A and B. A client reads the value of A and then writes it to B.

(i) At the time the client performs these operations, a partition separates servers X and Y from server Z. Describe the quora obtained and the operations that take place if the client can access servers X and Y. (ii) Describe the quora obtained and the operations that take place if the client can access only server Z. (iii) The partition is repaired and then another partition occurs so that X and Z are separated from Y. Describe the quora obtained and the operations that take place if the client can access servers X and Z.

Computer Science & Information Technology

The STL relational function objects can also be applied to containers.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The Spacing feature represents the space between controls.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology