1
answer
1
watching
112
views
aminul2005Lv1
20 Feb 2022
A security auditor needs to review the manner in which an entertainment streaming device operates. The auditor is analyzing the output of a port scanning tool to determine the next steps in the security review. Given the following log output:
The best option for the auditor to use NEXT is:
- a SCAP assessment.
- reverse engineering.
- fuzzing.
- network interception.
A security auditor needs to review the manner in which an entertainment streaming device operates. The auditor is analyzing the output of a port scanning tool to determine the next steps in the security review. Given the following log output:
The best option for the auditor to use NEXT is:
- a SCAP assessment.
- reverse engineering.
- fuzzing.
- network interception.
Read by 1 person
20 Feb 2022