Last Updated on August 14, 2021 by Admin 3
A security analyst is reviewing an assessment report that includes software versions, running services, supported encryption algorithms, and permission settings. Which of the following produced the report?
- Vulnerability scanner
- Protocol analyzer
- Network mapper
- Web inspector