Deck 6: Analyzing Vulnerability Scans and Identifying Common Vulnerabilities

Full screen (f)
exit full mode
Question
Which of the following is a basic language that Nessus uses to help describe individual threats and potential attacks?

A) NASL
B) CVSS
C) SSL
D) USSL
Use Space or
up arrow
down arrow
to flip the card.
Question
_______________ is a set of commercial or professional procedures that are accepted or sometimes prescribed as being the most effective solutions.
Question
What is the final step in the analysis of a vulnerability scan?

A) Review
B) Interpretation
C) Validation
D) Correlation
Question
What is the term used for an alarm that is raised when there is no problem?
Question
Multiple metrics from a vulnerability scan make up the __________ score, which is produced by a complex series of algorithms.
Question
What term refers to a technology that can help evenly distribute work across a network?
Question
A desktop PC is an example of an embedded system.
Question
What is a hardware appliance or software that is used to join two separate computer networks to enable communication between them?

A) Router
B) Load balancer
C) Bridge
D) Switch
Question
______________ is a way to manage and present computer resources by function without regard to their physical layout or location.
Question
Which of the following is not considered an endpoint device?

A) Printer
B) SCADA system
C) MFD
D) Smart meter
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Analyzing Vulnerability Scans and Identifying Common Vulnerabilities
1
Which of the following is a basic language that Nessus uses to help describe individual threats and potential attacks?

A) NASL
B) CVSS
C) SSL
D) USSL
A
2
_______________ is a set of commercial or professional procedures that are accepted or sometimes prescribed as being the most effective solutions.
Best practices
3
What is the final step in the analysis of a vulnerability scan?

A) Review
B) Interpretation
C) Validation
D) Correlation
C
4
What is the term used for an alarm that is raised when there is no problem?
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
5
Multiple metrics from a vulnerability scan make up the __________ score, which is produced by a complex series of algorithms.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
6
What term refers to a technology that can help evenly distribute work across a network?
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
7
A desktop PC is an example of an embedded system.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
8
What is a hardware appliance or software that is used to join two separate computer networks to enable communication between them?

A) Router
B) Load balancer
C) Bridge
D) Switch
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
9
______________ is a way to manage and present computer resources by function without regard to their physical layout or location.
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is not considered an endpoint device?

A) Printer
B) SCADA system
C) MFD
D) Smart meter
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 10 flashcards in this deck.