Jane has recently implemented a new network design at her organization and wishes to passively identify security issues with the new network. Which of the following should Jane perform?
A. Vulnerability assessment
B. Black box testing
C. White box testing
D. Penetration testing
Answer: A. Vulnerability assessment
Computer Science & Information Technology
You might also like to view...
The command to print a file on a specific printer is
a: lp -d filename b: lp filename printer-name c: lp -d printer-name filename d: print filename ptr1 e: p -d printer-name filename
Computer Science & Information Technology
What is a drawback of SSDs?
A) Cost B) Speed C) Reliability D) MTBF
Computer Science & Information Technology
Provide an example of operator-entered data where the LIM instruction could be applied.
What will be an ideal response?
Computer Science & Information Technology
____ involves real-time transmission of video and audio between two locations.
A. Video conferencing B. Interactive television C. Internet telephony D. TV Internet service
Computer Science & Information Technology