exam questions

Exam 312-50v8 All Questions

View all questions & answers for the 312-50v8 exam

Exam 312-50v8 topic 8 question 104 discussion

Actual exam question from ECCouncil's 312-50v8
Question #: 104
Topic #: 8
[All 312-50v8 Questions]

To maintain compliance with regulatory requirements, a security audit of the systems on a network must be performed to determine their compliance with security policies. Which one of the following tools would most likely be used in such an audit?

  • A. Protocol analyzer
  • B. Vulnerability scanner
  • C. Port scanner
  • D. Intrusion Detection System
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️
A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for weaknesses.
They can be run either as part of vulnerability management by those tasked with protecting systems - or by black hat attackers looking to gain unauthorized access.
References: https://en.wikipedia.org/wiki/Vulnerability_scanner

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Currently there are no comments in this discussion, be the first to comment!
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...