What type of software application should network administrators routinely use to verify the security of their network and check for any weaknesses?
a. Honey pot
b. Posture monitor
c. Profile scanner
d. Vulnerability scanner
Answer: d. Vulnerability scanner
Computer Science & Information Technology
You might also like to view...
To add a node into a pane, use ______.
a. pane.add(node); b. pane.addAll(node); c. pane.getChildren().add(node); d. pane.getChildren().addAll(node);
Computer Science & Information Technology
_____ involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that an information system meets all specified requirements.
A. Integration testing B. System testing C. Volume testing D. User acceptance testing
Computer Science & Information Technology