A company hires a consulting firm to crawl its Active Directory network with a non-domain account looking for unpatched systems. Actively taking control of systems is out of scope, as is the creation of new administrator accounts. For which of the following is the company hiring the consulting firm?

A. Vulnerability scanning
B. Penetration testing
C. Application fuzzing
D. User permission auditing

Answer: A. Vulnerability scanning

Computer Science & Information Technology

You might also like to view...

A(n) ________ command changes based on the SharePoint page you are viewing

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which statement is true regarding differential / incremental backups?

A. A differential backup copies all files changed since the last full or differential backup. B. An incremental backup copies all files changed since the last full backup; doesn't mark files as backed up. C. Differential backups copy all files to the selected media and marks files as backed up. D. Incremental backups copy all files changed since the last full or incremental backup and marks files as backed up.

Computer Science & Information Technology