A security administrator wants to perform routine tests on the network during working hours when certain applications are being accessed by the most people. Which of the following would allow the security administrator to test the lack of security controls for those applications with the least impact to the system?

A. Penetration test
B. Vulnerability scan
C. Load testing
D. Port scanner


Answer: B. Vulnerability scan

Computer Science & Information Technology

You might also like to view...

public int getStudentNum() {    return studentNum; } ? In the above code, identify if the method is a mutator method or an accessor method. Describe how the two types of methods differ and how they are similar.

What will be an ideal response?

Computer Science & Information Technology

In the Configure Drivers window, the driver that can only be used to configure modules such as 1756-ENBT, EN2T, EN2F, or newer modules is the ____________________ driver.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can expand a panel to show all of its features or collapse it to show only the title bar.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The implementation process is typically monitored by the organizational ______.

A. security officer B. general counsel C. technology officer D. human resources

Computer Science & Information Technology