Which of the following are considered vulnerability assessments? (Choose all that apply.)

A. Nessus
B. Core Impact
C. MBSA
D. OpenVAS

A,B,C,D Nessus, Core Impact, MBSA, and OpenVAS are all considered vulnerability assessments.

Computer Science & Information Technology

You might also like to view...

Math.pow(4, 1 / 2) returns __________.

a. 2 b. 2.0 c. 0 d. 1.0 e. 1

Computer Science & Information Technology

Files to which data is written are called ____ files.

A. input B. output C. writeOnly D. readOnly

Computer Science & Information Technology