Which of the following allows active exploitation of security vulnerabilities on a system or network for the purpose of determining true impact?
A. Port scanning
B. Penetration testing
C. Vulnerability scanning
D. Performing risk analysis
Answer: B. Penetration testing
You might also like to view...
Source code can be analyzed both while the code is running and while it is not.
Answer the following statement true (T) or false (F)
?In the context of system performance, _____ is the hours a system is actually available for use divided by the hours the system is scheduled to be available and is expressed as a percentage.
a. ?reliability b. ?availability c. ?scalability d. ?system response time
Three types of synchronous time division multiplexing that are popular today are T-1 multiplexing,____ multiplexing, and SDH.?
A. ?EIA-232F B. ?IPS/SPX C. ?SONET D. ?RS-232
What should you divide content into using rules and active white space?
A. paragraphs B. sections C. columns D. rows