Which of the following approaches to vulnerability assessment relies on the administrator providing baseline of system configuration…?

Which of the following approaches to vulnerability assessment relies on the administrator
providing baseline of system configuration and then scanning continuously without
incorporating any information found at the time of scanning?

Which of the following approaches to vulnerability assessment relies on the administrator
providing baseline of system configuration and then scanning continuously without
incorporating any information found at the time of scanning?

A.
Service-based Assessment Solutions

B.
Product-based Assessment Solutions

C.
Tree-based Assessment

D.
Inference-based Assessment

Explanation:

Reference:
http://www.netsense.info/downloads/security_wp_mva.pdf(page 12, tree-based assessment
technology, second para)



Leave a Reply 3

Your email address will not be published. Required fields are marked *


alrooc

alrooc

“C” ECSAv8 Module 09 Pg. 285

Khaled Gamo

Khaled Gamo

C “Tree-based Assessment is relies on the administrator
providing baseline of system configuration and then scanning continuously without
incorporating any information found at the time of scanning”