Valid EC0-350 Dumps shared by ExamDiscuss.com for Helping Passing EC0-350 Exam! ExamDiscuss.com now offer the newest EC0-350 exam dumps, the ExamDiscuss.com EC0-350 exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com EC0-350 dumps with Test Engine here:
To maintain compliance with regulatory requirements, a security audit of the systems on a network must be performed to determine their compliance with security policies. Which one of the following tools would most likely be used in such an audit?
Correct Answer: B
Explanation/Reference: A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for weaknesses. They can be run either as part of vulnerability management by those tasked with protecting systems - or by black hat attackers looking to gain unauthorized access. References: https://en.wikipedia.org/wiki/Vulnerability_scanner