A security administrator plans to conduct a vulnerability scan on the network to determine if system applications are up to date
. The administrator wants to limit disruptions to operations but not consume too many resources. Which of the following types of vulnerability scans should be conducted? a. Credentialed
b. Non-intrusive
c. SYN
d. Port
The program is correct: at the beginning, product = 0. Then, we start summing Y to that variable, and we sum Y exactly X times, because with each iteration we increase Count by 1, and check if Count=X so that we can exit the loop.