A newly joined employee, Janet, has been allocated an existing system used by a previous employee. Before issuing the system to Janet, it was assessed by
Martin, the administrator. Martin found that there were possibilities of compromise through user directories, registries, and other system parameters. He also identified vulnerabilities such as native configuration tables, incorrect registry or file permissions, and software configuration errors.
What is the type of vulnerability assessment performed by Martin?
Daniel8660
Highly Voted 6 months, 3 weeks agodinonino
Most Recent 7 months, 3 weeks agoANDRESCB1988
1 year, 9 months ago