Vulnerability Management Module 12 Quiz with accurate || || || || || || ||
answers
Which of the following is NOT true regarding a vulnerability scan? - ✔✔It audits only the
|| || || || || || || || || || || || || || || ||
devices that are used but not the processes to protect devices.
|| || || || || || || || || ||
Why are open-source libraries vulnerable? - ✔✔These libraries are not owned and controlled by
|| || || || || || || || || || || || || ||
any single entity.
|| ||
Isai needs to continuously analyze apps for vulnerabilities and wants a dashboard that the security
|| || || || || || || || || || || || || || ||
team can use to monitor the applications' current security features. What tool would Isai select? -
|| || || || || || || || || || || || || || || ||
✔✔package monitoring ||
Which of the following is NOT a challenge of running a vulnerability scan? - ✔✔low volume of
|| || || || || || || || || || || || || || || || ||
scan data ||
Which of the following is NOT true about threat intelligence? - ✔✔Threat intelligence is
|| || || || || || || || || || || || || ||
especially vital to penetration testing. || || || ||
Kostyantyn has been asked to explore part of the web that is the domain of threat actors to look
|| || || || || || || || || || || || || || || || || || ||
for information about the latest types of attacks. What area of the web will he explore? - ✔✔dark
|| || || || || || || || || || || || || || || || || ||
web
Where do third-party sources get their threat intelligence data? - ✔✔from the information they
|| || || || || || || || || || || || || ||
collect from their own customers
|| || || ||
Which of the following is NOT an advantage of an organization sharing threat intelligence
|| || || || || || || || || || || || || ||
information? - ✔✔Organizations can identify third-party OSINT providers more quickly to
|| || || || || || || || || || ||
purchase their threat feeds. || || ||