Which of the following would verify that a threat does exist and security controls can easily be bypassed without actively testing an application?
A. Protocol analyzer
B. Vulnerability scan
C. Penetration test
D. Port scanner
Answer: B. Vulnerability scan
Computer Science & Information Technology
You might also like to view...
An Office feature that displays a list of potential results is a:
A) dialog box. B) header. C) library. D) gallery.
Computer Science & Information Technology
Although you can use spaces when naming files, it is a good idea to avoid them because it might hamper transferring files over the Internet
Indicate whether the statement is true or false
Computer Science & Information Technology