Posted by: Pdfprep
Post Date: November 5, 2020
A security analyst is investigating a vulnerability In which a default file permission was set incorrectly. The company uses non-credentialed scanning for vulnerability management.
Which of the following tools can the analyst use to verify the permissions?
A . ssh
B . chmod
C . ls
D . setuid
E . nessus
F . nc
Answer: B
Leave a Reply