Answer:
D. Network vulnerability database
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
In this scenario, The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulnerabilities scattered across the company. Most systems appear to have OS patches applied on a consistent basis but there is a large variety of best practices that do not appear to be in place. Thus, to ensure all systems are adhering to common security standards a Network vulnerability database, which typically comprises of security-related software errors, names of software, misconfigurations, impact metrics, and security checklist references should be used.
Basically, the Network vulnerability database collects, maintain and share information about various security-related vulnerabilities on computer systems and software programs.
The answer is the amount of money you put in it, brainliest please.
Answer:
Justify this statement with an example. Ans: Computer Network reduces expenses of an office because computer on a network share different hardware devices like printers, scanners, hard disk etc. And sharing those hardware devicAes will reduces the expense of an office.
Explanation:
Justify this statement with an example. Ans: Computer Network reduces expenses of an office because computer on a network share different hardware devices like printers, scanners, hard disk etc. And sharing those hardware devicAes will reduces the expense of an office.
In the case above, what just comes to mind as part of the process is option d.
<h3>What is sniffer?</h3>
A sniffer is known to be a kind of a software or hardware tool that gives room for a person to be able to “sniff” or look through one's internet traffic in real time, getting all the data flowing to and from a person's computer.
Therefore, In the case above, what just comes to mind as part of the process is option d.
Learn more about sniffer from
brainly.com/question/14265770
#SPJ1