Tools called ________ can be used to identify unused and,therefore,unnecessary programs that represent potential security threats.
A) router scanners
B) vulnerabilities scanners
C) deep inspection scanners
D) TCP scanners
Correct Answer:
Verified
Q39: _ is/are an example of a preventive
Q40: The steps that criminals take to find
Q41: The process of turning off unnecessary features
Q42: Perimeter defense is an example of which
Q43: This protocol specifies the structure of packets
Q45: A special purpose hardware device or software
Q46: Which of the below keeps a record
Q47: This protocol specifies the procedures for dividing
Q48: This network access control determines which IP
Q49: The process that screens individual IP packets
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents