________ checks the system for known exploitable attack vectors typically found on unpatched systems.
A. Port scanning
B. Vulnerability scanning
C. Network scanning
D. Workstation scanning
Answer: B. Vulnerability scanning
Computer Science & Information Technology
You might also like to view...
A form can be used to:
A) automate the retrieval and update process. B) sort data in ascending or descending order. C) enter, edit, and view records in a database. D) select records that meet specific criteria.
Computer Science & Information Technology
Which of the following is NOT an Electronic Access Control (EAC) component?
A. Electromagnetic lock B. Tumbler C. Credential reader D. Closed door sensor
Computer Science & Information Technology