0 votes
in Security Assessment by

Which of the following is typically used by threat actors security analysts trying to determine the security posture of externally accessible assets?

Select the appropriate answer from below options: 

a) Unauthorized scan

b) Authorized Scan

c) Inactive vulnerability scan

d) Active vulnerability scan

1 Answer

0 votes
by

Correct answer of the above question is : a) Unauthorized scan

Related questions

0 votes
asked Aug 17, 2021 in Security Assessment by Robindeniel
0 votes
asked Aug 17, 2021 in Security Assessment by Robindeniel
...