Morris, a professional hacker, performed a vulnerability scan on a target organization by sniffing the traffic on the network to identify the active systems, network services, applications, and vulnerabilities. He also obtained the list of the users who are currently accessing the network.
What is the type of vulnerability assessment that Morris performed on the target organization?
jeremy13
Highly Voted 1 year, 9 months agoqtygbapjpesdayazko
Most Recent 11 months, 3 weeks agoinsaniunt
1 year, 1 month agoSoloMaan
1 year, 2 months agoHackerTom
4 months, 1 week agoIPconfig
1 year, 3 months agoVincent_Lu
1 year, 7 months agovictorfs
1 year, 9 months agoeli117
1 year, 10 months ago