What sort of vulnerability assessment approach starts by building an inventory of protocols found on the machine?

What sort of vulnerability assessment approach starts by building an inventory of protocols
found on the machine?

What sort of vulnerability assessment approach starts by building an inventory of protocols
found on the machine?

A.
Inference-based Assessment

B.
Service-based Assessment Solutions

C.
Product-based Assessment Solutions

D.
Tree-based Assessment

Explanation:

Reference:

http://www.businessweek.com/adsections/2005/pdf/wp_mva.pdf(page 26, first para on the
page)



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Abuzer

Abuzer

A (ECSAv8 Module 09 Vulnerability Analysis page 285)