ECCouncil Exam Questions

What sort of vulnerability assessment approach starts by building an inventory of protocols found on

What sort of vulnerability assessment approach starts by building an inventory of protocols
found on the machine?

A.
Inference-based Assessment

B.
Service-based Assessment Solutions

C.
Product-based Assessment Solutions

D.
Tree-based Assessment

Explanation:

Reference:

http://www.businessweek.com/adsections/2005/pdf/wp_mva.pdf(page 26, first para on the
page)