An organization is performing a vulnerability assessment for mitigating threats. James, a pen tester, scanned the organization by building an inventory of the protocols found on the organization’s machines to detect which ports are attached to services such as an email server, a web server, or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests.
What is the type of vulnerability assessment solution that James employed in the above scenario?
jeremy13
Highly Voted 1 year agophojr
9 months agokikour
Most Recent 2 weeks, 4 days agobrrbrr
2 months, 1 week agoqtygbapjpesdayazko
1 month, 3 weeks ago[Removed]
4 months, 2 weeks agoinsaniunt
5 months agoIPconfig
6 months agoN00b1e
7 months agoinsaniunt
8 months, 3 weeks agoHarrysphills
11 months agoJuice98
11 months, 4 weeks agoteenwolf18
12 months agoChipless
1 year agoptrckm
1 year agoeli117
1 year ago