A newly joined employee, Janet, has been allocated an existing system used by a previous employee. Before issuing the system to Janet, it was assessed by Martin, the administrator. Martin found that there were possibilities of compromise through user directories, registries, and other system parameters. He also identified vulnerabilities such as native configuration tables, incorrect registry or file permissions, and software configuration errors.
What is the type of vulnerability assessment performed by Martin?
BallCS
2 months, 4 weeks agoRobertVidal
3 months agoMann098
3 months, 3 weeks agokimsteve
4 months, 3 weeks agoinsaniunt
4 months, 3 weeks agovargasamson
6 months agojks945797
8 months, 1 week agoamomyty
9 months, 1 week agonaija4life
9 months, 3 weeks agoHarrysphills
10 months, 3 weeks agojeremy13
11 months, 3 weeks agoeli117
1 year ago