Which of the following involves using various tools to find vulnerabilities in a system?

A) Port scanning
B) Vulnerability scanning
C) Enumeration
D) Vulnerability assessment

D) Vulnerability assessment

Computer Science & Information Technology

You might also like to view...

What is an avatar? What advantages does it offer that are lacking in conventional animation clips presented as AVI files?

What will be an ideal response?

Computer Science & Information Technology

Why might you want to write a program in a machine-independent language instead of a machine-dependent language? Why might a machine-dependent language be more appropriate for writing certain types of programs?

What will be an ideal response?

Computer Science & Information Technology