Which of the following approaches to vulnerability assessment relies on the administrator
providing baseline of system configuration and then scanning continuously without
incorporating any information found at the time of scanning?
A.
Service-based Assessment Solutions
B.
Product-based Assessment Solutions
C.
Tree-based Assessment
D.
Inference-based Assessment
Explanation:
Reference:
http://www.netsense.info/downloads/security_wp_mva.pdf(page 12, tree-based assessment
technology, second para)
C
“C” ECSAv8 Module 09 Pg. 285
C “Tree-based Assessment is relies on the administrator
providing baseline of system configuration and then scanning continuously without
incorporating any information found at the time of scanning”