Which of the following assessment types can monitor and alert on attacks but cannot stop them

An ethical hacker is running an assessment test on your networks and systems. The assessment test includes the following items:

- Inspecting physical security
- Checking open ports on network devices and router configurations
- Scanning for Trojans, spyware, viruses, and malware
- Evaluating remote management processes
- Determining flaws and patches on the internal network systems, devices, and servers

Which of the following assessment tests is being performed?

Which of the following are phases of the vulnerability management lifecycle?

The Vulnerability Management Life Cycle is intended to allow organizations to identify computer system security weaknesses; prioritize assets; assess, report, and remediate the weaknesses; and verify that they have been eliminated.

Which of the following are the three metrics used to determine CVSS score?

A CVSS score is a derived from scores in three metrics groups, Base, Temporal and Environmental, that cover the different characteristics of a vulnerability, including its impact and environmental endurance over time.

Which site most often shows the newest vulnerabilities before other sources quizlet?

Which of the following best describes the Full Disclosure site? A mailing list that often shows the newest vulnerabilities before other sources. `

Which of the following best describes the verification phase of the vulnerability management life cycle VMLC )?

Which of the following best describes the verification phase of the vulnerability management life cycle? Communicate clearly to management what your findings and recommendations are for locking down the systems and patching problems.