− | The following tests are intended to exercise known weak protocols, or protocols which when poorly configured can be exploited.
| + | IPscan includes the following tests to exercise known weak protocols, or protocols which when poorly configured, can be exploited. |