A security analyst has set up a network tap to monitor network traffic for vulnerabilities. Which of the following techniques would BEST describe the approach the analyst has taken?
A. Compliance scanning
B. Credentialed scanning
C. Passive vulnerability scanning
D. Port scanning
Answer: D. Port scanning
Computer Science & Information Technology
You might also like to view...
What happens if you select a file in the Local Site window and click the Get button?
What will be an ideal response?
Computer Science & Information Technology
In presentation software, a ____ automatically applies any new formatting to all slides in your presentation that use it.?
A. ?slide master B. ?slide pane C. ?report D. ?filter
Computer Science & Information Technology