85. Analyzing Vulnerabilities

85. Analyzing Vulnerabilities

Assessment

Interactive Video

Professional Development

Professional Development

Easy

Created by

Jennifer Clark

Used 1+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a false positive in the context of vulnerability scanning?

A vulnerability that exists but is not reported

A vulnerability that does not exist but is reported

A vulnerability that is correctly identified

A vulnerability that is ignored

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is a false negative considered worse than a false positive?

Because it means a vulnerability is reported but does not exist

Because it means a vulnerability exists but is not detected

Because it means a vulnerability is ignored

Because it means a vulnerability is detected but not reported

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the Common Vulnerability Scoring System (CVSS) provide?

A score to prioritize vulnerabilities

A method to fix vulnerabilities

A way to ignore low-priority vulnerabilities

A list of all known vulnerabilities

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an exposure factor in vulnerability management?

A list of all vulnerabilities in a system

A percentage representing the potential impact of a vulnerability

A method to patch vulnerabilities

A measure of how often a vulnerability is exploited

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is risk tolerance in the context of patching vulnerabilities?

The amount of risk an organization is willing to accept

The effectiveness of a patch

The number of vulnerabilities in a system

The speed at which patches are deployed

Discover more resources for Professional Development