A user is asked to analyze the current state of a computer operating system. What should the user compare the current operating system against to identify potential vulnerabilities?
- a baseline
- a blacklist
- a pentest
- a vulnerability scan
- a whitelist
Для просмотра статистики ответов нужно
войти.