Answer:
b. Customized auditing.
Explanation:
Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.
There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.
The credentialed scanning provides baseline and customised auditing features.
E-text <span>is digital textual information that can be stored, manipulated, and transmitted by electronic devices. The term "e-text" stands for electronic text and it is used for any digital document written, read, transmitted or manipulated by electronic devices, such as smart phones, PCs, tablets,...The origins of the e-text are in the beginning of the Internet.</span>
Answer:
c. nbtstat -a 193.145.85.202
Explanation:
Nbtstat is a TCP/IP utility which is used to display the current connections and statistics of TCP/IP using NetBIOS over TCP/IP (NetBT).
It is installed on a computer running Microsoft Windows when the TCP/IP protocol stack is installed.
Also, it is very useful when we want to troubleshoot NetBIOS name resolution problems.
One can run nbtstat -a < ComputerName > to obtain the local NetBIOS name table on <ComputerName> and its MAC address
A management information system is a computer system consisting of hardware and software that serves as the backbone of an organization's operations