PdfPrep.com

A security administrator begins assessing a network with software that checks for available exploits against a known database, using both credentials and external scripts. A report will be compiled and used to confirm patching levels.

A security administrator begins assessing a network with software that checks for available exploits against a known database, using both credentials and external scripts. A report will be compiled and used to confirm patching levels.

This is an example of:
A . penetration testing
B . fuzzing
C . static code analysis
D . vulnerability scanning

Answer: D

Exit mobile version