Which of the following tools or methods can discover security weaknesses, including misconfigurations, out of date software, missing patches, and open ports?

A. port scanner
B. vulnerability scanner
C. HTTP interceptor
D. ping sweep

B
Explanation: While a port scanner can discover open ports, vulnerability scanners can probe for a variety of security weaknesses, including misconfigurations, out of date software, missing patches and open ports. One of the most widely used is Nessus, a proprietary vulnerability scanner developed by Tenable Network Security.

Computer Science & Information Technology

You might also like to view...

The ________ displays buttons to perform frequently used commands with a single click at the top of your screen while working within Microsoft Office programs

A) File Tab B) Title Bar C) Status Bar D) Quick Access Toolbar

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. When using the strcat function, you must be careful not to overflow the bounds of the array allocated for the target string. 2. The C++ compiler performs strict array bounds checking whenever an array of characters is being accessed. 3. The string class append member function str.append(s)tacks a string s to the end of str. 4. It is possible to implement a string class by using a dynamically allocated array of characters. 5. The following statement declares a string object and initializes it to "Once upon a time".

Computer Science & Information Technology