Which of the following are considered vulnerability assessments? (Choose all that apply.)

A. Nessus
B. Core Impact
C. MBSA
D. OpenVAS


A,B,C,D Nessus, Core Impact, MBSA, and OpenVAS are all considered vulnerability assessments.

Computer Science & Information Technology

You might also like to view...

Method shuffle is a member of __________.

a. class Arrays. b. class Collections. c. interface Collection. d. Interface List.

Computer Science & Information Technology

When inserting a chart, it comes complete with sample data in a(n) __________, which you'll change to reflect the data you want to display on your chart.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

iDiary is ordered by

a. event b. date c. friend d. class

Computer Science & Information Technology

Which of the following file extensions are used by the Debian Package Manager?

A. .dpm B. .deb C. .dpkg D. .d

Computer Science & Information Technology