You have been tasked to improve your company’s vulnerability management program. You decided that you want to add the ability to remotely scan systems for vulnerabilities remotely. What software could be used for this purpose?
cURL
Cuckoo
Nessus
theHarvester
Operations and Incident Response | |
Architecture and Design | |
Implementation | |
Governance, Risk, and Compliance | |
Attacks, Threats, and Vulnerabilities |