Which of the following allows active exploitation of security vulnerabilities on a system or network for the purpose of determining true impact?

A. Port scanning
B. Penetration testing
C. Vulnerability scanning
D. Performing risk analysis


Answer: B. Penetration testing

Computer Science & Information Technology

You might also like to view...

Source code can be analyzed both while the code is running and while it is not.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

?In the context of system performance, _____ is the hours a system is actually available for use divided by the hours the system is scheduled to be available and is expressed as a percentage.

a. ?reliability b. ?availability c. ?scalability d. ?system response time

Computer Science & Information Technology

Three types of synchronous time division multiplexing that are popular today are T-1 multiplexing,____ multiplexing, and SDH.?

A. ?EIA-232F B. ?IPS/SPX C. ?SONET D. ?RS-232

Computer Science & Information Technology

What should you divide content into using rules and active white space?

A. paragraphs B. sections C. columns D. rows

Computer Science & Information Technology