Which of the following would verify that a threat does exist and security controls can easily be bypassed without actively testing an application?

A. Protocol analyzer
B. Vulnerability scan
C. Penetration test
D. Port scanner

Answer: B. Vulnerability scan

Computer Science & Information Technology

You might also like to view...

An Office feature that displays a list of potential results is a:

A) dialog box. B) header. C) library. D) gallery.

Computer Science & Information Technology

Although you can use spaces when naming files, it is a good idea to avoid them because it might hamper transferring files over the Internet

Indicate whether the statement is true or false

Computer Science & Information Technology