To maintain compliance with regulatory requirement
s, a security audit of the systems on a network must be performed to determine their compliance with security policies. Which one of the following tools would most likely be used in such an audit?
A. Vulnerability scanner
B. Protocol analyzer
C. Port
scanner
D. Intrusion Detection System
A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for weaknesses.
They can be run either as part of vulnerability management by those task
ed with protecting systems – or by black hat attackers looking to gain unauthorized access.
References: