Which of the following is commonly done as part of a vulnerability scan?
A. Exploiting misconfigured applications
B. Cracking employee passwords
C. Sending phishing emails to employees
D. Identifying unpatched workstations
Answer: C. Sending phishing emails to employees
Computer Science & Information Technology
You might also like to view...
When an image that the Eyedropper tool is clicked on has several shades or colors, the shade or color at the location the Eyedropper is clicked is the one copied
Indicate whether the statement is true or false
Computer Science & Information Technology
Looping allows an audio or video file to play repeatedly until it is stopped manually
Indicate whether the statement is true or false
Computer Science & Information Technology