List of questions
Related questions
Question 278 - 312-50v12 discussion
A newly joined employee. Janet, has been allocated an existing system used by a previous employee.
Before issuing the system to Janet, it was assessed by Martin, the administrator. Martin found that there were possibilities of compromise through user directories, registries, and other system parameters. He also Identified vulnerabilities such as native configuration tables, incorrect registry or file permissions, and software configuration errors. What is the type of vulnerability assessment performed by Martin?
A.
Credentialed assessment
B.
Database assessment
C.
Host-based assessment
D.
Distributed assessment
Your answer:
0 comments
Sorted by
Leave a comment first