A(n) ____________________ vulnerability scanner is one that initiates traffic on the network in order to determine security holes.

Fill in the blank(s) with the appropriate word(s).


active

Computer Science & Information Technology

You might also like to view...

Which of the following statements correctly creates a Font object?

a. new Font(34); b. new Font("Times", 34); c. Font.font("Times", 34); d. Font.font("Times", FontWeight.NORMAL, 34); e. Font.font("Times", FontWeight.NORMAL, FontPosture.ITALIC, 34);

Computer Science & Information Technology

What are two ways you can change the fill of a shape?

What will be an ideal response?

Computer Science & Information Technology

A(n) ________ is designed for low-energy embedded systems, such as an iPad

A) Google chip B) ARM chip C) Intel chip D) Apple chip

Computer Science & Information Technology

A basic Word template can store macros. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology