Vulnerability assessments scan networks for ________ security weaknesses.
A. zero day
B. unknown
C. 0 day
D. known
Answer: D. known
Computer Science & Information Technology
You might also like to view...
When creating a(n) ________, you need to specify the order of the fields
A) multiple-field index B) single-field index C) input mask D) custom format
Computer Science & Information Technology
____________________ links are easily identified because they are often underlined and appear in a different color.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology