Copyright Goodheart-Willcox Co., Inc. May not be reproduced or posted to a publicly accessible website. 24 Security Essentials Lab Manual 15. In your opinion, explain how often you think a vulnerability scan should be conducted on a normal user’s computer compared to that of a privileged user. _ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________ 16. Close all programs, and submit your lab to your instructor.
Previous Page Next Page