Multiple Choice
This uses automated tools to identify whether a given system possesses any well-known security problems.
A) Intrusion detection system
B) Log analysis
C) Penetration test
D) Vulnerability scan
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q4: Which of the following is an example
Q24: Which of the following is not one
Q26: The device that connects an organization's information
Q30: Which of the following preventive controls are
Q31: This processes involves the firewall examining the
Q32: Murray Snitzel called a meeting of the
Q33: How does an intrusion detection system work?
Q34: This is used to identify rogue modems
Q39: If the time an attacker takes to
Q44: In a private key system the sender