Jim performed a vulnerability analysis on his network and found no potential problems. He runs another utility that executes exploits against his system to verify the results of the vulnerability test. The second utility executes five known exploits against his network in which the vulnerability analysis said were not exploitable. What kind of results did Jim receive from his vulnerability analysis?
A) False negatives
B) False positives
C) True negatives
D) True positives
Correct Answer:
Verified
Q566: Terri works for a security consulting firm
Q567: When setting up a wireless network with
Q568: What is kept in the following directory?
Q569: You work as a penetration tester for
Q570: What operating system would respond to the
Q572: You are running through a series of
Q573: Software firewalls work at which layer of
Q574: After passing her CEH exam, Carol wants
Q575: Paul's company is in the process of
Q576: Harold is a security analyst who has
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents