Which of the following is BEST utilized to identify common misconfigurations throughout the
enterprise?
A.
Vulnerability scanning
B.
Port scanning
C.
Penetration testing
D.
Black box
Which of the following is BEST utilized to identify common misconfigurations throughout the
enterprise?
Which of the following is BEST utilized to identify common misconfigurations throughout the
enterprise?
A.
Vulnerability scanning
B.
Port scanning
C.
Penetration testing
D.
Black box