Which of the following involves using various tools to find vulnerabilities in a system?
A) Port scanning
B) Vulnerability scanning
C) Enumeration
D) Vulnerability assessment
D) Vulnerability assessment
Computer Science & Information Technology
You might also like to view...
What is an avatar? What advantages does it offer that are lacking in conventional animation clips presented as AVI files?
What will be an ideal response?
Computer Science & Information Technology
Why might you want to write a program in a machine-independent language instead of a machine-dependent language? Why might a machine-dependent language be more appropriate for writing certain types of programs?
What will be an ideal response?
Computer Science & Information Technology