Here’s the Answer to the Question posted on Facebook
Q. Lisa has scanned all the usser computers in the organization as part of a security audit. She is creating an inventory of these systems, including a list of applications running on each computer and the application versions. What is she MOST likely trying to identify?
A. System architecture
B. Application baseline
C. Code vulnerabilities
D. Attack surface
Answer available until July 24, 2015.
|Get over 400 Security+ (SY0-401 questions here).|
See Chapter 5 of the CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide.