Certified Ethical Hacker – CEH – 312-50 – Question449

Which of the following tools would MOST LIKELY be used to perform security audit on various of forms of network systems?


A.
Intrusion Detection System
B. Vulnerability scanner
C. Port scanner
D. Protocol analyzer

Correct Answer: B