Question 316:
A security analyst has set up a network tap to monitor network traffic for vulnerabilities. Which of the following techniques would BEST describe the approach the analyst has taken?
Answer options:
A. Compliance scanning B. Credentialed scanning C. Passive vulnerability scanning D. Port scanning