PdfPrep.com

Which of the following tools can the analyst use to verify the permissions?

A security analyst is investigating a vulnerability In which a default file permission was set incorrectly. The company uses non-credentialed scanning for vulnerability management.

Which of the following tools can the analyst use to verify the permissions?
A . ssh
B . chmod
C . ls
D . setuid
E . nessus
F . nc

Answer: B

Exit mobile version