Question 90:
A security analyst wants to identify which vulnerabilities a potential attacker might initially exploit if the network is compromised. Which of the following would provide the BEST results?
Answer options:
A. Baseline configuration assessment B. Uncredentialed scan C. Network ping sweep D. External penetration test