Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?

Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?









A. Penetration test

B. Code review

C. Vulnerability scan

D. Brute Force scan







Answer: C


Computer Science

Learn More Multiple Choice Question :