Which of the following is BEST utilized to actively test security controls on a particular system?

A. Port scanning
B. Penetration test
C. Vulnerability scanning
D. Grey/Gray box


Answer: B. Penetration test

Computer Science & Information Technology

You might also like to view...

So that merge fields can be inserted correctly, a Word table used as a data source must contain fields that are recognizably named

Indicate whether the statement is true or false

Computer Science & Information Technology

Axes titles are:

A) descriptive labels that show exact values or name of a data point. B) the value or name of a data point on the X-axis. C) display on the X-axis by default. D) not displayed by default.

Computer Science & Information Technology

Which of the following reads the magnetic stripe on the back of credit cards, entertainment cards, bank cards, and other similar cards?

A. MICR reader B. magstripe reader C. OCR reader D. OMR reader

Computer Science & Information Technology

The ________ is the lowest value for a category in the table lookup table.

What will be an ideal response?

Computer Science & Information Technology