Which of the following tools is primarily used to perform vulnerability assessments?
Vulnerability scanners
Intrusion detection systems
Overlook minor misbehaviors
Impose harsh punishments for any infraction

Network Management Exercises are loading ...