Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?
A. Penetration test
B. Code review
C. Vunerability scan
D. Brute Force scan
Answer: C. Vunerability scan
Computer Science & Information Technology
You might also like to view...
In order to tell the user what happened in an exception one must
a) pop the exception b) toss the exception c) access the exception’s properties d) throw the exception
Computer Science & Information Technology
What is the difference between a service method and a support method in a class definition?
What will be an ideal response?
Computer Science & Information Technology
Most languages provide a built-in way to check whether a value that is entered is numeric or not.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Any system improvement can be made only after extensive analysis of the needs of the system's resources, requirements, managers, and users.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology