Which of the following would a security administrator implement in order to discover comprehensive security threats on a network?

  • Design reviews
  • Vulnerability scan
  • Baseline reporting
  • Code review

CompTIA Security+ SY0-401
  • Network Security
    • This question is filed here
  • Compliance and Operational Security
  • Threats and Vulnerabilities
  • Application, Data and Host Security
  • Access Control and Identity Management
  • Cryptography