Which of the following involves using various tools to find vulnerabilities in a system?
A) Port scanning
B) Vulnerability scanning
C) Enumeration
D) Vulnerability assessment
D) Vulnerability assessment
Computer Science & Information Technology
You might also like to view...
A while loop can be used to code both definite and indefinite loops.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The heading of a try block can contain ellipses in place of a parameter.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Which of the following is true of Webcast?
a. It allows limited one-way communication. b. It supports interactive multimedia presentations. c. It provides active application sharing. d. It enables interactive video chat and voice calls.
Computer Science & Information Technology
When first created, a path is called a(n) ___________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology