Multiple Choice
When performing a vulnerability assessment, many organizations use ____ software to search a system for any port vulnerabilities.
A) threat scanner
B) vulnerability profiler
C) port scanner
D) application profiler
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q2: A _ outlines the major security considerations
Q3: _ is the proportion of an asset's
Q5: The _ is the expected monetary loss
Q6: A security weakness is known as a(n)
Q8: In an empty box test, the tester
Q11: _ is the probability that a risk
Q12: Discuss one type of asset that an
Q16: Most vulnerability scanners maintain a(n) _ that
Q34: When a security hardware device fails or
Q37: List and describe two common uses for