An organization is performing a vulnerability assessment for mitigating threats. James, a pen tester, scanned the organization by building an inventory of the protocols found on the organization’s machines to detect which ports are attached to services such as an email server, a web server, or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests.
What is the type of vulnerability assessment solution that James employed in the above scenario?
jeremy13
Highly Voted 2 years, 2 months agophojr
1 year, 11 months agobrrbrr
Highly Voted 9 months, 2 weeks agoqtygbapjpesdayazko
1 year, 3 months agoMann098
Most Recent 6 months, 1 week agoChipless
9 months, 2 weeks agoJuice98
9 months, 2 weeks agocybershortie
11 months, 3 weeks agoNicknp
1 year, 1 month agokikour
1 year, 2 months ago[Removed]
1 year, 6 months agoinsaniunt
1 year, 7 months agoIPconfig
1 year, 8 months agoN00b1e
1 year, 9 months agoinsaniunt
1 year, 11 months agoHarrysphills
2 years, 1 month agoteenwolf18
2 years, 2 months agoptrckm
2 years, 2 months agoeli117
2 years, 3 months ago