Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?

A. Penetration test
B. Code review
C. Vunerability scan
D. Brute Force scan


Answer: C. Vunerability scan

Computer Science & Information Technology

You might also like to view...

In order to tell the user what happened in an exception one must

a) pop the exception b) toss the exception c) access the exception’s properties d) throw the exception

Computer Science & Information Technology

What is the difference between a service method and a support method in a class definition?

What will be an ideal response?

Computer Science & Information Technology

Most languages provide a built-in way to check whether a value that is entered is numeric or not.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Any system improvement can be made only after extensive analysis of the needs of the system's resources, requirements, managers, and users.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology