Which of the following involves using various tools to find vulnerabilities in a system?

A) Port scanning
B) Vulnerability scanning
C) Enumeration
D) Vulnerability assessment


D) Vulnerability assessment

Computer Science & Information Technology

You might also like to view...

A while loop can be used to code both definite and indefinite loops.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The heading of a try block can contain ellipses in place of a parameter.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is true of Webcast?

a. It allows limited one-way communication. b. It supports interactive multimedia presentations. c. It provides active application sharing. d. It enables interactive video chat and voice calls.

Computer Science & Information Technology

When first created, a path is called a(n) ___________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology