Question: 0 - day vulnerabilities Question 1 options: should be checked for a patch on NVD . do not have a patch. are due to buffer
day vulnerabilities
Question options:
should be checked for a patch on NVD
do not have a patch.
are due to buffer overflow.
can't result in attacks.
Question Mandatory points
Some organizations don't set up their computers for automatic updates because such updates may require administrative privileges.Sothey do the updates during off hours or in case of emergency.The automatic updates
Question options:
could install malware.
is not the same thing as patching, so they have no use really.
could be better for patchingofOS than nonautomaticupdates as they narrow down the vulnerability window.
do not have any patches.
Question Mandatory points
Common vulnerabilities and exposures CVEon the National Vulnerability Database NVDcontains information about vulnerabilities relating toSQL injections, authentication issues and buffer overflow errors.This CVE database
Question options:
also includesinformation about the fixes.
does not include the year they were discovered.
are in software only.
are in operating systems only.
Question Mandatory points
Patch management tools can report whatpatches are available
Question options:
and relate them to known vulnerabilities.
but can't install them.
but do not support vulnerability management.
but can't relate them to specific vulnerabilities.
Question Mandatory points
No vulnerability management capability VULcan verify the absence of those vulnerabilitiesthat are reportedin the CVE database.
Question options:
TrueFalse
Question Mandatory points
NMAP and NESSUS both can be used for port scanning. NESSUS also gives an output about the vulnerabilities.But it's not free,like NMAP.The NMAP can get information about OS and Application versions
Question options:
this information can be used along with CVE to find day vulnerabilities in the OS and applications.
this information can be used along with CVE to findknownvulnerabilities in the OS and applications.
this information can't be used to findknownvulnerabilities in the OS and applications.
this information is useful for an attacker but can't help in patch management.
Question Mandatory points
Penetration testing is a better way of testing than vulnerability scanners,as you can also test for the attack vectors,such as access weaknesses and privilege escalation. In fact
Question options:
vulnerability scanner will be part of penetration testing.
vulnerability scanner has nothing to do withpenetration testing.
penetration testing can't be done for your own organization and can only be done through a third party who can break into your system externally.
penetration testing is another name for vulnerability scanning.
Question Mandatory points
Sandboxing, Intrusion Detection Systems, Honey pots and data back ups are ways of
Question options:
OS patching.
vulnerability management.
penetration testing.
countermeasures against attacks.
Question Mandatory points
Kernel space vulnerabilities are in general more dangerous than user space vulnerabilities because a break into kernel can expose device drivers and OS modules.
Question options:
TrueFalse
Question Mandatory points
A mobile phone connected to the Internet is more prone to attacks than a mobile phone not connected to the Internet.
Question options:
TrueFalse
Submit Quiz of questions saved
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
