PdfPrep.com

Given the task at hand the requirement of being covert, which of the following statements BEST indicates that the vulnerability scan meets these requirements?

A black hat hacker is enumerating a network and wants to remain covert during the process. The hacker initiates a vulnerability scan.

Given the task at hand the requirement of being covert, which of the following statements BEST indicates that the vulnerability scan meets these requirements?
A . The vulnerability scanner is performing an authenticated scan.
B . The vulnerability scanner is performing local file integrity checks.
C . The vulnerability scanner is performing in network sniffer mode.
D . The vulnerability scanner is performing banner grabbing.

Answer: C

Exit mobile version