Which of the following involves using various tools to find vulnerabilities in a system?

a. Port scanning
b. Port blocking
c. Enumeration
d. Vulnerability assessment

ANS: D

Computer Science & Information Technology

You might also like to view...

Under which of the following circumstances should an officer not transmit on the police radio?

a. The officer observes an electrical power wire lying on the ground. b. An off-duty officer observes an automobile collision. c. Another officer is involved in an emergency and has asked for radio clearance. d. The officer is making a "routine" traffic stop.

Computer Science & Information Technology

By default, animations in an animation set are applied simultaneously (i.e., in parallel), but you can use the ________ attribute to specify the number of millisec-onds into the future at which an animation should begin. This can be used to se-quence the animations in a set.

a. android:startTime b. android:offset c. android:sequence d. android:startOffset

Computer Science & Information Technology