During a vulnerability assessment, what type of software can be used to search a system for port vulnerabilities?
A. threat scanner
B. vulnerability profiler
C. port scanner
D. application profiler
Answer: C
Computer Science & Information Technology
You might also like to view...
A photo album is a presentation composed of pictures
Indicate whether the statement is true or false
Computer Science & Information Technology
In which of the following is a 2032 CMOS battery MOST often found?
A. Desktops B. Portable printers C. Bluetooth Mice D. Notebooks
Computer Science & Information Technology