Deck 6: Analyzing Vulnerability Scans and Identifying Common Vulnerabilities

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is a basic language that Nessus uses to help describe individual threats and potential attacks?

A) NASL
B) CVSS
C) SSL
D) USSL
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
_______________ is a set of commercial or professional procedures that are accepted or sometimes prescribed as being the most effective solutions.
سؤال
What is the final step in the analysis of a vulnerability scan?

A) Review
B) Interpretation
C) Validation
D) Correlation
سؤال
What is the term used for an alarm that is raised when there is no problem?
سؤال
Multiple metrics from a vulnerability scan make up the __________ score, which is produced by a complex series of algorithms.
سؤال
What term refers to a technology that can help evenly distribute work across a network?
سؤال
A desktop PC is an example of an embedded system.
سؤال
What is a hardware appliance or software that is used to join two separate computer networks to enable communication between them?

A) Router
B) Load balancer
C) Bridge
D) Switch
سؤال
______________ is a way to manage and present computer resources by function without regard to their physical layout or location.
سؤال
Which of the following is not considered an endpoint device?

A) Printer
B) SCADA system
C) MFD
D) Smart meter
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 6: Analyzing Vulnerability Scans and Identifying Common Vulnerabilities
1
Which of the following is a basic language that Nessus uses to help describe individual threats and potential attacks?

A) NASL
B) CVSS
C) SSL
D) USSL
NASL
2
_______________ is a set of commercial or professional procedures that are accepted or sometimes prescribed as being the most effective solutions.
Best practices
3
What is the final step in the analysis of a vulnerability scan?

A) Review
B) Interpretation
C) Validation
D) Correlation
Validation
4
What is the term used for an alarm that is raised when there is no problem?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
5
Multiple metrics from a vulnerability scan make up the __________ score, which is produced by a complex series of algorithms.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
6
What term refers to a technology that can help evenly distribute work across a network?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
7
A desktop PC is an example of an embedded system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
8
What is a hardware appliance or software that is used to join two separate computer networks to enable communication between them?

A) Router
B) Load balancer
C) Bridge
D) Switch
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
9
______________ is a way to manage and present computer resources by function without regard to their physical layout or location.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following is not considered an endpoint device?

A) Printer
B) SCADA system
C) MFD
D) Smart meter
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.