Last Updated on August 14, 2021 by Admin
A security analyst has set up a network tap to monitor network traffic for vulnerabilities. Which of the following techniques would BEST describe the approach the analyst has taken?
- Compliance scanning
- Credentialed scanning
- Passive vulnerability scanning
- Port scanning