Answer:
b. Customized auditing.
Explanation:
Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.
There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.
The credentialed scanning provides baseline and customised auditing features.
Answer:
ICT is the abbreviated form of Information and Communication. It included different technologies like mobile phones, computers, USBs etc.
Following are two precautionary measures which should be observed when using any kind of ICT:
- Use of Antivirus: It can used to protect anything placed inside the technology especially from hacking and viruses which can create many issues.
- Backup Data: Creating a backup of the data stored in the device is important as it can be recalled when the device malfunctions. Backup of the data can be created through using USBs, CDs etc or through cloud storage
Formatting toolbar because if you look to the right there is the slides and at the top it says: Formatting toolbar