________ checks the system for known exploitable attack vectors typically found on unpatched systems.

A. Port scanning
B. Vulnerability scanning
C. Network scanning
D. Workstation scanning

Answer: B. Vulnerability scanning

Computer Science & Information Technology

You might also like to view...

A form can be used to:

A) automate the retrieval and update process. B) sort data in ascending or descending order. C) enter, edit, and view records in a database. D) select records that meet specific criteria.

Computer Science & Information Technology

Which of the following is NOT an Electronic Access Control (EAC) component?

A. Electromagnetic lock B. Tumbler C. Credential reader D. Closed door sensor

Computer Science & Information Technology