What sort of vulnerability assessment approach starts by building an inventory of protocols
found on the machine?
A.
Inference-based Assessment
B.
Service-based Assessment Solutions
C.
Product-based Assessment Solutions
D.
Tree-based Assessment
Explanation:
Reference:
http://www.businessweek.com/adsections/2005/pdf/wp_mva.pdf(page 26, first para on the
page)
A (ECSAv8 Module 09 Vulnerability Analysis page 285)