PrepAway - Latest Free Exam Questions & Answers

Which of the following would verify that a threat does exist and security controls can easil…

Which of the following would verify that a threat does exist and security controls can easil

y be bypassed without actively testing an application?

A. Protocol analyzer

B. Vulnerability scan

C. Penetration test

D. Port scanner

Explanation:

A vulnerability scan is the automated process of proactively identifying security vulnerabilities

of computing systems in a network in order to determine if and where a system can be exploited and/or threatened. While public servers are important for communication and data transfer over the Internet, they open the door to potential security breaches b

y threat agents, such as malicious hackers.

Vulnerability scanning employs software that seeks out security flaws based on a database of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individu

al or an enterprise can use to tighten the networks security.

Vulnerability scanning typically refers to the scanning of systems that are connected to the Internet but can also refer to system audits on internal networks that are not connected to the Inte

rnet in order to assess the threat of rogue software or malicious employees in an enterprise.


Leave a Reply