Question: Question 2 7 A security analyst at a large corporation initiates a vulnerability scan on the company's web application. Upon completion, the results show several

Question 27
A security analyst at a large corporation initiates a vulnerability scan on the company's web
application. Upon completion, the results show several potential vulnerabilities. One of these
vulnerabilities, identified as "Potential SQL Injection," is a concern. However, after further
inspection, the analyst realizes this vulnerability does not exist in the application and the
scanner has made an error. Given the scenario above, what term BEST describes the
vulnerability scanner's identification of the "Potential SQL Injection" that does not exist in the
application?
False positive
False negative
True negative
True positive

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!