Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

QUESTION 1 Patch management tools can report what patches are available and rela

ID: 3911704 • Letter: Q

Question

QUESTION 1 Patch management tools can report what patches are available and relate them to known vulnerabilities. but can't install them. but do not support vulnerability management. but can't relate them to specific vulnerabilities. QUESTION 2 Common vulnerabilities and exposures (CVE) on the National Vulnerability Database (NVD) contains information about vulnerabilities relating to SQL injections, authentication issues and buffer overflow errors. This CVE database Oalso includes information about the fixes. does not include the year they were discovered. are in software only. are in operating systems only. QUESTION 3 No vulnerability management capability (VuL can verty the absence of those vulherabilities that are reported in the CVE database. O True False QUESTION 4 10 A mobile phone connected fo the Internet is more prone to attacks than a mobile pl phone not connected to the Internet True False

Explanation / Answer

Question 1:

patch management tools can report what patches are available and relate them to known vulnerabilities.

patches are small pices of related installed programs/software for remove bugs or fix bugs and remove vulnerabilities.

Question 2:

Common vulnerabilities and exposures (CVE) not he National Vulnerability Database (NVD) contains information about vulnerabilities relating to SQL Injections, authentication issues and buffer overflow errors. The CVE database also includes information about the fixes.

They have also information about what they early and now fixes.

Question 3:

No vulnerability management capability (VUL) can verify the absence of those vulnerabilities that are reported in the CVE database. True
Each fixes has record in CVE database but the recently bus have may be other related to the same error.

Question 4:

A mobile phone connected to the internet is more prone to attack than a mobile phone not connected to the internet. True
When a mobile or any device is connected to the internet has more chances to attacks vulnerabilities programs or virus than mobile not connected to the internet.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote