To comply with industry requirements, a security assessment on the cloud server should identify which
protocols and weaknesses are being exposed to attackers on the Internet. Which of the following tools is the
MOST appropriate to complete the assessment?
A. Use tcpdump and parse the output file in a protocol analyzer.
B. Use an IP scanner and target the cloud WAN network addressing.
C. Run netstat in each cloud server and retrieve the running processes.
D. Use nmap and set the servers' public IPs as the targets.
protocols and weaknesses are being exposed to attackers on the Internet. Which of the following tools is the
MOST appropriate to complete the assessment?
A. Use tcpdump and parse the output file in a protocol analyzer.
B. Use an IP scanner and target the cloud WAN network addressing.
C. Run netstat in each cloud server and retrieve the running processes.
D. Use nmap and set the servers' public IPs as the targets.