Question: You know that your network has a web server that has missing patches; however, the vulnerability scanner says the webserver is not missing any patches.

You know that your network has a web server that has missing patches; however, the vulnerability scanner says the
webserver is not missing any patches. What is this called?
A. false positive B. true negative C. false negative|D. true positive
What is monitoring user behavior and comparing current behavior to a baseline?
A. Sentiment analysis
B. Log aggregation
C. Packet capture
D. User behavior analysis (UBA)
Your vulnerability scanner tells you that your web server is not missing any patches. Before the scan, you updated
your web server with all the patches. What do we call this situation?
A. true positive
B. false positive
C. true negative
D. false negative
What are tools that automatically detect and respond to suspicious activity?
A. Common Vulnerabilities and Exposures (CVE)
B. Security information and Event Management (SIEM)
C. Common Vulnerability Scoring System (CV5S)
D. Security Orchestration, Automation, and Response (SOAR)
Which of the following is NOT part of a vulnerability scan?
A. Identify lack of security controls
B. Passively test security controls
C. Exploit vulnerabilities
D. Identify common misconfigurations
Which testing is intrusive and can potentially bring down a system?
A. non-credentialed scanning
B. pen-testing
C. credentialed scanning
D. vulnerability scanning
What does a vulnerability scanner use to identify potential vulnerabilities?
A. hashing
B. database of known vulnerabilities
C. false positives
D. key loggers
_ is an open standard that assesses the severity of vulnerabilities.
A. Common Vulnerability Scoring System (CVS5)
B. Common vulnerabilities and Exposures (CVE)
C. Security Information and Event Management (SIEM)
D. Security Orchestration, Automation, and Response (SOAR)
What is putting dissimilar data into the same format for convenient searching and analyzing?
A. User behavior analysis (UBA)
B. Log aggregation
C. Packet capture
D. Sentiment analysis
What is analyzing text to detect an opinion or emotion?
A. Sentiment analysis
B. Packet capture
C. User behavior analysis (UBA)
 You know that your network has a web server that has

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!