________ checks the system for known exploitable attack vectors typically found on unpatched systems.

A. Port scanning
B. Vulnerability scanning
C. Network scanning
D. Workstation scanning


Answer: B. Vulnerability scanning

Computer Science & Information Technology

You might also like to view...

The ____ provides developer tools for the Windows Phone.

A. Windows Phone Emulator B. HP web05 SDK C. MobileOne Studio D. IPhoney

Computer Science & Information Technology

RAM chips have ________ to prevent improper installation

Fill in the blank(s) with correct word

Computer Science & Information Technology

A(n) ________ is a list of variable data to include in the document, effectively personalizing it, such as your name and major

Fill in the blank(s) with correct word

Computer Science & Information Technology

If a computer's video subsystem does not contain a separate video adapter, where would you find the electronic circuits for sending instructions to the monitor?

A) On the sound card B) On the special RAM chips C) On the motherboard Flash BIOS chip D) On the motherboard

Computer Science & Information Technology