Morris, a professional hacker, performed a vulnerability scan on a target organization by sniffing the traffic on the network to identify the active systems, network services, applications, and vulnerabilities. He also obtained the list of the users who are currently accessing the network.
What is the type of vulnerability assessment that Morris performed on the target organization?
qtygbapjpesdayazko
8 months, 3 weeks agoinsaniunt
11 months agoSoloMaan
1 year agoIPconfig
1 year agoVincent_Lu
1 year, 4 months agovictorfs
1 year, 6 months agojeremy13
1 year, 6 months agoeli117
1 year, 7 months ago