1
answer
2
watching
222
views
aminul2005Lv1
22 Feb 2022
A security auditor needs to review the manner in which an entertainment streaming device operates. The auditor is analyzing the output of a port scanning tool to determine the next steps in the security review. Given the following log output:
The best option for the auditor to use NEXT is:
- A. a SCAP assessment.
- B. reverse engineering.
- C. fuzzing.
- D. network interception.
Please dont give me open source information .... i have all the open source information with me .... the open source answer is A ..... i also have study pool answer which is B .... but if i read carefully i can see the port 80 is open hence network interception.
Please justify with the answer
A security auditor needs to review the manner in which an entertainment streaming device operates. The auditor is analyzing the output of a port scanning tool to determine the next steps in the security review. Given the following log output:
The best option for the auditor to use NEXT is:
- A. a SCAP assessment.
- B. reverse engineering.
- C. fuzzing.
- D. network interception.
Please dont give me open source information .... i have all the open source information with me .... the open source answer is A ..... i also have study pool answer which is B .... but if i read carefully i can see the port 80 is open hence network interception.
Please justify with the answer
Read by 4 people
23 Feb 2022