Review Questions
Answer the following review questions. Check your answers with the answer key in Appendix A.
What type of vulnerability scanner can be used to assess vulnerable web services?
What documents do vendors, vulnerability coordination centers, and security researchers publish to disclose security vulnerabilities?
What term is used to describe an organization that can assign CVEs to vulnerabilities?
What public database can anyone use to obtain information about security vulnerabilities affecting software and hardware products?
How many score “groups” are supported in CVSS?
A vulnerability with a CVSS score of 4.9 is considered a ___________ severity vulnerability.
What is the process of iteratively looking for threats that may have bypassed your security controls?