1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lisabon 2012 [21]
3 years ago
11

The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulner

abilities scattered across the company. Most systems appear to have OS patches applied on a consistent basis_ but there is a large variety of best practices that do not appear to be in place. Which of the following would be BEST to ensure all systems are adhering to common security standards?
A. Configuration compliance
B. Patch management
C. Exploitation framework
D. Network vulnerability database
Computers and Technology
1 answer:
gayaneshka [121]3 years ago
5 0

Answer:

D. Network vulnerability database

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

In this scenario, The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulnerabilities scattered across the company. Most systems appear to have OS patches applied on a consistent basis but there is a large variety of best practices that do not appear to be in place. Thus, to ensure all systems are adhering to common security standards a Network vulnerability database, which typically comprises of security-related software errors, names of software, misconfigurations, impact metrics, and security checklist references should be used.

Basically, the Network vulnerability database collects, maintain and share information about various security-related vulnerabilities on computer systems and software programs.

You might be interested in
Another important mode, XTS-AES, has been standardized by the __________ Security in Storage Working Group. a. IEEE b. ITIL c. N
Archy [21]

Answer:

a. IEEE

Explanation:

The organization with the acronym 'IEEE' is commonly known as the Institute of Electrical and Electronics Engineer. The organization is responsible for the standardization and implementation of various important modes such as the XTS-AES. This is widely used for data encryption and it is a major part of the AES algorithm.

8 0
3 years ago
Read 2 more answers
What are some ways to find out what skills you need to develop at work? Check all of the boxes that apply.
Anarel [89]

Answer:

Attend traings

Explanation:

Because if you do you can learn diffent waay to do it and choose your way that you like.

ANd do not obseve poeple who has it easy  

7 0
3 years ago
Read 2 more answers
The components of hardware include:
zlopas [31]

Answer:

A

Explanation:

Monitor, CPU, Disk Drives, Printer, Keyboard/mouse

5 0
3 years ago
Read 2 more answers
Give me at least five main characteristic of irrigation equipment​
ss7ja [257]

Answer:

flow control devices

filters

fertigation equipment

water emitters

automation equipment

operation equipment

water-lifting devices.

3 0
3 years ago
I need help ASAP Please! :)
amid [387]
Your parents,your school,google,your social media accounts
3 0
3 years ago
Other questions:
  • Who is president is US
    5·1 answer
  • Implement the function pairSum that takes as parameters a list of distinct integers and a target value n and prints the indices
    11·1 answer
  • Which of the following is the correct code to link the text "Sunny Days" to the website www.sunnysunshine.com?
    15·1 answer
  • Jeremy wants to run a program file from the command prompt. Which of the following should Jeremy type in the command prompt wind
    8·2 answers
  • Having friends who cause you stress can decrease your happiness, which can in turn
    13·2 answers
  • Which 2 processes are operational processes
    10·1 answer
  • Heeeeeeeelp :)<br> thx<br> jfdyiusjmkdsuiho;dmcvrvho;j
    5·2 answers
  • What statement best describes entrepreneurship?
    7·2 answers
  • Imagine that a team of scientists test a certain hypothesis, and the experimental results show that it is false.
    6·1 answer
  • Describe your ideas for a keyboarding game that would help someone improve their skills.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!