A user is asked to analyze the current state of a computer operating system. What should the user compare the current operating system against to identify potential vulnerabilities?

  • a baseline
  • a blacklist
  • a pentest
  • a vulnerability scan
  • a whitelist
Для просмотра статистики ответов нужно войти.