A company that performs passive vulnerability scanning at its transit VPC has detected a vulnerability related to outdated web-server software on one of its public subnets. Which of the following can the company use to verify if this is a true positive with the least effort and cost? (Choose two.)
Joshuac1392
Highly Voted 1 year, 2 months agoBigM
Most Recent 2 months, 2 weeks agoWereAllinThisTogether
5 months, 4 weeks agoFrancisDrake
1 year, 2 months ago