The example of an activity that can be automated from the options provided is vulnerability scanning. Vulnerability scanning involves using automated tools to identify potential security weaknesses in systems, networks, or applications. While risk assessments and security assessments often require human judgment and analysis, vulnerability scanning can be performed with automation tools. Penetration testing, on the other hand, typically involves manual testing and decision-making.
Which of the following is an example of an activity that can be automated?(1 point)
Responses
risk assessment
risk assessment
security assessment
security assessment
vulnerability scanning
vulnerability scanning
penetration testing
1 answer