Joe, a security analyst, is attempting to determine if a new server meets the security requirements of his organization. As a step in this process, he attempts to identify a lack of security controls and to identify common misconfigurations on the server. Which of the following is Joe attempting to complete?

A. Black hat testing
B. Vulnerability scanning
C. Black box testing
D. Penetration testing

Answer: B. Vulnerability scanning

Computer Science & Information Technology

You might also like to view...

The ________ data type stores serial numbers that are converted and formatted as dates or times

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which Word research feature lets you look up synonyms for awkward or repetitive words? Describe the steps you would take to use this feature.

What will be an ideal response?

Computer Science & Information Technology