Which of the following is typically used by threat actors/security analysts trying to determine the security posture of externally accessible assets?
Answers
Answered by
1
Answer:
Unauthenticated scans is typically utilized by malicious actors or security analysts trying to control the security posture of externally accessible assets.
Explanation:
The unauthenticated scan is a method that can provide the number of false-positive results and not able to give detailed data about the asset installed software and operating system.
It is also called as logged out scan that defines the process of discovering a network for endangered that are attainable without signing in as an authorized user.
Similar questions