Jane has recently implemented a new network design at her organization and wishes to passively identify security issues with the new network. Which of the following should Jane perform?

A. Vulnerability assessment
B. Black box testing
C. White box testing
D. Penetration testing


Answer: A. Vulnerability assessment

Computer Science & Information Technology

You might also like to view...

The command to print a file on a specific printer is

a: lp -d filename b: lp filename printer-name c: lp -d printer-name filename d: print filename ptr1 e: p -d printer-name filename

Computer Science & Information Technology

What is a drawback of SSDs?

A) Cost B) Speed C) Reliability D) MTBF

Computer Science & Information Technology

Provide an example of operator-entered data where the LIM instruction could be applied.

What will be an ideal response?

Computer Science & Information Technology

____ involves real-time transmission of video and audio between two locations.

A. Video conferencing B. Interactive television C. Internet telephony D. TV Internet service

Computer Science & Information Technology