A company hires a third-party vendor to perform a vulnerability scan of the network from outside the network. Which of the following pieces of information will be included in the scan results? (Choose two.)

A. List of open ports
B. List of OS patches to install
C. Date of installed virus definitions
D. List of server BIOS passwords
E. List of firmware versions

Answer:
A. List of open ports
B. List of OS patches to install

Computer Science & Information Technology

You might also like to view...

A good way to keep hackers out of a computer is to install a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Wavy red and green lines that appear below segments of text indicate ________

A) a style change from previous text B) the start of a new paragraph C) flagged errors D) presence of formatting marks

Computer Science & Information Technology