Question: A security analyst is attempting to identify vulnerabilities in a customers web application without impacting the system of its data. Which of the following BEST
A security analyst is attempting to identify vulnerabilities in a customers web application without impacting the system of its data. Which of the following BEST describes the vulnerability scanning concept performed?
- Aggressive scan
- Passive scan
- Non-credentialed scan
- Compliance scan
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
