Question: A Security administrator begins assessing a network with software that checks for available exploits against a known database using both credentialed and external scripts. A
A Security administrator begins assessing a network with software that checks for available exploits against a known database using both credentialed and external scripts. A report will be compiled and used to confirm patching levels. This is an example of:
-
penetration testing
-
Fuzzy
-
Static code analysis
-
vulnerability scanning
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
