Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?

Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?



A. Penetration test

B. Code review

C. Vulnerability scan

D. Brute Force scan




Answer: C


Learn More :

Network Security

Learn More Multiple Choice Question :