Which of the following network vulnerability scan indicators BEST validates a successful, active scan?
A. The scan job is scheduled to run during off-peak hours.
B. The scan output lists SQL injection attack vectors.
C. The scan data identifies the use of privileged-user credentials.
D. The scan results identify the hostname and IP address.
Answer: B. The scan output lists SQL injection attack vectors.
Computer Science & Information Technology
You might also like to view...
When on the Home tab, go to the ________ button to create a multilevel list
A) heading B) tab C) multilevel list D) bullet
Computer Science & Information Technology
The ____ symbol on a button in a GUI interface moves to the first record in the database and displays its data.
A. 1 B. << C. >> D. <
Computer Science & Information Technology