Morris, a professional hacker, performed a vulnerability scan on a target organization by sniffing the traffic on the network to identify the active systems, network services, applications, and vulnerabilities. He also obtained the list of the users who are currently accessing the network.
What is the type of vulnerability assessment that Morris performed on the target organization?
jeremy13
Highly Voted 1 year, 6 months agoqtygbapjpesdayazko
Most Recent 8 months, 1 week agoinsaniunt
10 months, 2 weeks agoSoloMaan
11 months, 3 weeks agoHackerTom
1 month agoIPconfig
1 year agoVincent_Lu
1 year, 4 months agovictorfs
1 year, 5 months agoeli117
1 year, 7 months ago