During a vulnerability assessment, what type of software can be used to search a system for port vulnerabilities?

A. threat scanner
B. vulnerability profiler
C. port scanner
D. application profiler

Answer: C

Computer Science & Information Technology

You might also like to view...

A photo album is a presentation composed of pictures

Indicate whether the statement is true or false

Computer Science & Information Technology

In which of the following is a 2032 CMOS battery MOST often found?

A. Desktops B. Portable printers C. Bluetooth Mice D. Notebooks

Computer Science & Information Technology