Joe, a security analyst, is attempting to determine if a new server meets the security requirements of his organization. As a step in this process, he attempts to identify a lack of security controls and to identify common misconfigurations on the server. Which of the following is Joe attempting to complete?

A. Black hat testing
B. Vulnerability scanning
C. Black box testing
D. Penetration testing


Answer: B. Vulnerability scanning

Computer Science & Information Technology

You might also like to view...

What are the different values of the Type field in the Ethernet headers that you observed?

What will be an ideal response?

Computer Science & Information Technology

An executable program file might have the extension _________.

a. PGM b. EXE c. RUN d. A program file name can use any extension.

Computer Science & Information Technology

Which field property type should be used to enter a predefined value into a field when most of the records will have the same value?

A) Validation Text B) Input Mask C) Default Value D) Validation Rule

Computer Science & Information Technology

?Inline images can be turned into links by enclosing the image within opening and closing tags.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology