Which of the following is commonly done as part of a vulnerability scan?

A. Exploiting misconfigured applications
B. Cracking employee passwords
C. Sending phishing emails to employees
D. Identifying unpatched workstations


Answer: C. Sending phishing emails to employees

Computer Science & Information Technology

You might also like to view...

What is wrong with the following code?

float scores[10], total; a. Cannot declare regular and array variables together. b. Arrays must be integers c. The 10 should be replaced with a variable name, whose value is input from the user d. Nothing.

Computer Science & Information Technology

In the accompanying figure, Item 3 points to the ____.

A. Name box B. title bar C. Formula bar D. toolbox

Computer Science & Information Technology

What manages the resources on a network?

A. client B. server C. Bluetooth D. modem

Computer Science & Information Technology

How can an administrator initiate a system state recovery using the command line?

A. wbadmin staterecovery start B. wbadmin start systemstaterecovery C. wbadmin recover D. wbadmin restore catalog

Computer Science & Information Technology