Vulnerability assessments scan networks for ________ security weaknesses.

A. zero day
B. unknown
C. 0 day
D. known

Answer: D. known

Computer Science & Information Technology

You might also like to view...

When creating a(n) ________, you need to specify the order of the fields

A) multiple-field index B) single-field index C) input mask D) custom format

Computer Science & Information Technology

____________________ links are easily identified because they are often underlined and appear in a different color.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology