Which of the following is commonly done as part of a vulnerability scan?

A. Exploiting misconfigured applications
B. Cracking employee passwords
C. Sending phishing emails to employees
D. Identifying unpatched workstations

Answer: C. Sending phishing emails to employees

Computer Science & Information Technology

You might also like to view...

When an image that the Eyedropper tool is clicked on has several shades or colors, the shade or color at the location the Eyedropper is clicked is the one copied

Indicate whether the statement is true or false

Computer Science & Information Technology

Looping allows an audio or video file to play repeatedly until it is stopped manually

Indicate whether the statement is true or false

Computer Science & Information Technology