Describe the purpose of the CVE and how it works.
What will be an ideal response?
The Common Vulnerabilities and Exposures (CVE) standard enables devices to share information about attack signatures and other vulnerabilities so that they can work together. CVE enables hardware and security devices that support it to draw from the same databases of vulnerabilities, which are presented in a standard format. For instance, a scanner is a device that scans a network for open ports or other potential vulnerabilities. If the scanner supports CVE, you can use it to compile a report that lists weak points in the system. When an alarm message is transmitted by an IDPS that also supports CVE, the attack signature can be compared to the report of current vulnerabilities to see whether an attack has actually occurred.
You might also like to view...
What kind of application tests a class by creating an object of that class and calling the class’s methods?
a. Pseudo application. b. Debugger. c. Declarator. d. Test harness.
Which of the following is NOT a Zoom option?
A) Two pages B) Page width C) Many pages D) Whole page
Which of the following would be the correct network classification for large network unicast addresses?
A) Class A B) Class B C) Class C D) Class D E) Class E
The concept of present possession suggests which of the following?
a. Just because those files were on a subject's computer, that doesn't mean the subject knew they were were. b. Since the files are in the subject's possession, the assumption is that the subject knew they were there. c. Because the file was knowingly moved from one location to another, the user knew the file was there. d. The fact that the file exists on the hard drive proves that the user had direct access to the file.