PrepAway - Latest Free Exam Questions & Answers

Which one of the following tools would most likely be u…

To maintain compliance with regulatory requirements, a security audit of the systems on a network must be
performed to determine their compliance with security policies. Which one of the following tools would most
likely be used in such an audit?

PrepAway - Latest Free Exam Questions & Answers

A.
Vulnerability scanner

B.
Protocol analyzer

C.
Port scanner

D.
Intrusion Detection System

Explanation:
A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or
applications for weaknesses.
They can be run either as part of vulnerability management by those tasked with protecting systems – or by
black hat attackers looking to gain unauthorized access.
https://en.wikipedia.org/wiki/Vulnerability_scanner


Leave a Reply