Which one of the following tools would most likely be u…

To maintain compliance with regulatory requirements, a security audit of the systems on a network must be
performed to determine their compliance with security policies. Which one of the following tools would most
likely be used in such an audit?

To maintain compliance with regulatory requirements, a security audit of the systems on a network must be
performed to determine their compliance with security policies. Which one of the following tools would most
likely be used in such an audit?

A.
Vulnerability scanner

B.
Protocol analyzer

C.
Port scanner

D.
Intrusion Detection System

Explanation:
A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or
applications for weaknesses.
They can be run either as part of vulnerability management by those tasked with protecting systems – or by
black hat attackers looking to gain unauthorized access.
https://en.wikipedia.org/wiki/Vulnerability_scanner



Leave a Reply 0

Your email address will not be published. Required fields are marked *