A newly joined employee, Janet, has been allocated an existing system used by a previous employee. Before issuing the system to Janet, it was assessed by Martin, the administrator. Martin found that there were possibilities of compromise through user directories, registries, and other system parameters. He also identified vulnerabilities such as native configuration tables, incorrect registry or file permissions, and software configuration errors.
What is the type of vulnerability assessment performed by Martin?
BallCS
4 months, 2 weeks agoRobertVidal
4 months, 2 weeks agoMann098
5 months, 1 week agokimsteve
6 months, 1 week agoinsaniunt
6 months, 2 weeks agovargasamson
7 months, 3 weeks agojks945797
10 months agoamomyty
11 months agonaija4life
11 months, 1 week agoHarrysphills
1 year agojeremy13
1 year, 1 month agoeli117
1 year, 2 months ago