
Vulnerability Analysis
Authored by Vishnu Saini
Specialty
12th Grade
Used 8+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a vulnerability assessment tool?
Aircrack-ng
Nessus
John the Ripper
Cain & Abel
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are a consultant for an IT company. Your boss asks you to determine the topology of the network. What is the best device to use in this circumstance?
Network mapper
Protocol analyzer
Port scanner
Vulnerability scanner
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the best action to take when you conduct a corporate vulnerability assessment?
Document your scan results for the change control board
Examine vulnerability data with a network sniffer
Update systems
Organize based on severity and asset value
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why would a security administrator use a vulnerability scanner? (Select the best answer?
To identify remote access policies
To analyze protocols
To map the network
To find open ports on a server
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following can you use as a foundation when building a vulnerability assessment report?
Tools
Nmap
Salami
SQL Injection
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is CVSSv2?
Latest version of the CVE
Latest version of CVS
Latest version of SANS Top 20 controls
None of these
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
CWE refers to ?
common weakness enumeration
common weakness exposures
common vulnerability scoring system
common weakness explanation
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?