Which of the following network vulnerability scan indicators BEST validates a successful, active scan?

A. The scan job is scheduled to run during off-peak hours.
B. The scan output lists SQL injection attack vectors.
C. The scan data identifies the use of privileged-user credentials.
D. The scan results identify the hostname and IP address.

Answer: B. The scan output lists SQL injection attack vectors.

Computer Science & Information Technology

You might also like to view...

When on the Home tab, go to the ________ button to create a multilevel list

A) heading B) tab C) multilevel list D) bullet

Computer Science & Information Technology

The ____ symbol on a button in a GUI interface moves to the first record in the database and displays its data.

A. 1 B. << C. >> D. <

Computer Science & Information Technology