Multiple Choice
Tools called ________ can be used to identify unused and,therefore,unnecessary programs that represent potential security threats.
A) router scanners
B) vulnerabilities scanners
C) deep inspection scanners
D) TCP scanners
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q32: Information technology managers are often in a
Q33: This protocol specifies the structure of packets
Q34: The process of maintaining a table listing
Q35: Describe the basic steps criminal use to
Q36: Logs need to be analyzed regularly to
Q38: Identify six physical access controls.
Q39: If the time an attacker takes to
Q40: _ is an authorized attempt by an
Q41: A separate network located outside the organization's
Q42: Which of the following is not one