Home > Articles

This chapter is from the book

Review Questions

Answer the following review questions. Check your answers with the answer key in Appendix A.

  1. What type of vulnerability scanner can be used to assess vulnerable web services?

  2. What documents do vendors, vulnerability coordination centers, and security researchers publish to disclose security vulnerabilities?

  3. What term is used to describe an organization that can assign CVEs to vulnerabilities?

  4. What public database can anyone use to obtain information about security vulnerabilities affecting software and hardware products?

  5. How many score “groups” are supported in CVSS?

  6. A vulnerability with a CVSS score of 4.9 is considered a ___________ severity vulnerability.

  7. What is the process of iteratively looking for threats that may have bypassed your security controls?

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.