Multiple Choice
During a review of vulnerability scan results, an analyst determines the results may be flawed because a control-baseline system, which is used to evaluate a scanning tool's effectiveness, was reported as not vulnerable. Consequently, the analyst verifies the scope of the scan included the control-baseline host, which was available on the network during the scan. The use of a control-baseline endpoint in this scenario assists the analyst in confirming:
A) verification of mitigation.
B) false positives.
C) false negatives.
D) the criticality index.
E) hardening validation.
Correct Answer:

Verified
Correct Answer:
Verified
Q23: Which of the following would a security
Q24: A cyber-incident response analyst is investigating a
Q25: An analyst is participating in the solution
Q26: A Chief Information Security Officer (CISO) wants
Q27: Which of the following BEST articulates the
Q29: Which of the following sources would a
Q30: An information security analyst on a threat-hunting
Q31: A pharmaceutical company's marketing team wants to
Q32: An analyst is working with a network
Q33: A security analyst is reviewing a web