Posted by: Pdfprep
Post Date: November 5, 2020
A security analyst wishes to scan the network to view potentially vulnerable systems the way an attacker would.
Which of the following would BEST enable the analyst to complete the objective?
A . Perform a non-credentialed scan.
B . Conduct an intrusive scan.
C . Attempt escalation of privilege
D . Execute a credentialed scan.
Answer: A
Leave a Reply