A vulnerability scan is being conducted against a desktop system. The scan is looking for files, versions, and registry values known to be associated with system vulnerabilities. Which of the following BEST describes the type of scan being performed?
A. Non-intrusive
B. Authenticated
C. Credentialed
D. Active
Answer: C. Credentialed
Computer Science & Information Technology
You might also like to view...
If the data you are using does not have the same amount of time between each data value, you should consider using a(n) ________ chart
Fill in the blank(s) with correct word
Computer Science & Information Technology
What is in the static route command that represents the default gateway?
a. default-gateway b. 0.0.0.0/0 c. set route d. None of the above
Computer Science & Information Technology