Vulnerability assessment reports are classified into two types: security vulnerability report and security vulnerability summary.

a. true
b. false


Answer: a. true

Computer Science & Information Technology

You might also like to view...

When an employee is terminated from employment, the employee’s access to computers should be terminated:

a. At the next monthly audit b. At the next quarterly audit c. Within seven days d. Within one day

Computer Science & Information Technology

The numbers in an IP address are separated by ____.

A. commas B. colons C. semicolons D. periods

Computer Science & Information Technology

In finding and replacing codes, you need to click on the Special button found by clicking the:

A) More>> button in the Find and Replace dialog box. B) Format button in the Find and Replace dialog box. C) Less>> button in the Find and Replace dialog box. D) Page Layout tab.

Computer Science & Information Technology

A ____ is a network device that acts as an entrance to another network.

A. bridge B. router C. gateway D. switch

Computer Science & Information Technology