Morris, a professional hacker, performed a vulnerability scan on a target organization by sniffing the traffic on the network to identify the active systems, network services, applications, and vulnerabilities. He also obtained the list of the users who are currently accessing the network.
What is the type of vulnerability assessment that Morris performed on the target organization?
blacksheep6r
Highly Voted 2 years, 2 months agoDaniel8660
Highly Voted 1 year, 2 months agovictorfs
7 months, 3 weeks agovictorfs
Most Recent 7 months, 3 weeks agojinjection
2 years, 3 months agoGTofic
2 years, 1 month ago[Removed]
1 year, 11 months agoANDRESCB1988
2 years, 5 months ago