In determining when it may be necessary to perform a credentialed scan against a system instead of a non-credentialed scan, which of the following requirements is MOST likely to influence this decision?

A. The scanner must be able to enumerate the host OS of devices scanned.
B. The scanner must be able to footprint the network.
C. The scanner must be able to check for open ports with listening services.
D. The scanner must be able to audit file system permissions

Answer: D. The scanner must be able to audit file system permissions

Computer Science & Information Technology

You might also like to view...

What is the maximum groups an IAM user be a member of?

A. 20 B. 5 C. 10 D. 15

Computer Science & Information Technology

What is displayed by the code fragment below if the memory for next immediately follows the memory for word?

``` char word[12], next[4] = "Joe"; word[0] = 'c'; word[1] = 'a'; word[2] = 't'; printf("%s\n", word); ``` a. a line with just the word "cat" b. a line with the word "cat" followed by nine blanks c. the word "cat" followed by whatever garbage is in word[3] through word[11] followed by Joe (unless there is a null character somewhere in word[3] through word[11]) d. an error message e. the word "cat", the word "Joe", and the word "cat" again

Computer Science & Information Technology