AWS Exams GCP Exams Azure Exams GitHub Exams Jira Exams ISC2 Exams

Video: Before assigning an existing system to the eccouncil video

Question 1
« Back   Next ethical-hacker Certification Question »

Full Certification Question

Before assigning an existing system to the newly joined employee, Bernice, the administrator, Tom, conducted a vulnerability assessment. During the assessment, Tom identified potential vulnerabilities related to user directories, registries, and various system parameters. He pinpointed issues such as vulnerabilities in native configuration tables, improper registry or file permissions, and errors in software configuration. What type of vulnerability assessment did Tom perform in this scenario?