A security analyst has set up a network tap to monitor network traffic for vulnerabilities. Which of the following techniques would BEST describe the approach the analyst has taken?

A. Compliance scanning
B. Credentialed scanning
C. Passive vulnerability scanning
D. Port scanning

Answer: D. Port scanning

Computer Science & Information Technology

You might also like to view...

What happens if you select a file in the Local Site window and click the Get button?

What will be an ideal response?

Computer Science & Information Technology

In presentation software, a ____ automatically applies any new formatting to all slides in your presentation that use it.?

A. ?slide master B. ?slide pane C. ?report D. ?filter

Computer Science & Information Technology