A company hires a consulting firm to crawl its Active Directory network with a non-domain account looking for unpatched systems. Actively taking control of systems is out of scope, as is the creation of new administrator accounts. For which of the following is the company hiring the consulting firm?
A. Vulnerability scanning
B. Penetration testing
C. Application fuzzing
D. User permission auditing
Answer: A. Vulnerability scanning
Computer Science & Information Technology
You might also like to view...
A(n) ________ command changes based on the SharePoint page you are viewing
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which statement is true regarding differential / incremental backups?
A. A differential backup copies all files changed since the last full or differential backup. B. An incremental backup copies all files changed since the last full backup; doesn't mark files as backed up. C. Differential backups copy all files to the selected media and marks files as backed up. D. Incremental backups copy all files changed since the last full or incremental backup and marks files as backed up.
Computer Science & Information Technology