Which of the following is a network vulnerability scanner? (Choose two.)

A) Nessus
B) Keylogger
C) Nbtstat
D) Nmap
E) pathping

A, D
Explanation: Examples of these vulnerability scanners include Nessus and Nmap (network mapper). Keylogger, Nbtstat, and pathping are not network vulnerability scanners.
Examples of these vulnerability scanners include Nessus and Nmap (network mapper). Keylogger, Nbtstat, and pathping are not network vulnerability scanners.

Computer Science & Information Technology

You might also like to view...

The process component of the Social CRM mix is delicate because automating a broken process aggravates the existing issue. So it’s necessary to first evaluate the existing Social CRM processes. What are the seven business-process success criteria to help structure this?

What will be an ideal response?

Computer Science & Information Technology

The order of a finite field must be of the form pn where p is a prime and n is a __ . ?

A) ?identity element ? B) ?positive integer C) ?commutative ring ? D) ?associative

Computer Science & Information Technology