1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lisabon 2012 [21]
3 years ago
11

The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulner

abilities scattered across the company. Most systems appear to have OS patches applied on a consistent basis_ but there is a large variety of best practices that do not appear to be in place. Which of the following would be BEST to ensure all systems are adhering to common security standards?
A. Configuration compliance
B. Patch management
C. Exploitation framework
D. Network vulnerability database
Computers and Technology
1 answer:
gayaneshka [121]3 years ago
5 0

Answer:

D. Network vulnerability database

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

In this scenario, The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulnerabilities scattered across the company. Most systems appear to have OS patches applied on a consistent basis but there is a large variety of best practices that do not appear to be in place. Thus, to ensure all systems are adhering to common security standards a Network vulnerability database, which typically comprises of security-related software errors, names of software, misconfigurations, impact metrics, and security checklist references should be used.

Basically, the Network vulnerability database collects, maintain and share information about various security-related vulnerabilities on computer systems and software programs.

You might be interested in
True or false Rough estimates indicate that point suspension of your driver's license can average anywhere between $3,000+ and $
leva [86]
True however it’s also depends on where you live but for this purpose it’s true
7 0
3 years ago
What is the name of the book farrah gray published in 2005??
seropon [69]
He wrote Reallionaire
8 0
3 years ago
Wendy has to capture a sculpture in the middle of the park at night. She is not able to get the entire sculpture into focus in o
dsp73

Answer:

Focus Stacking

Explanation:

F-stop stacking which is also referred to as image stacking is a powerful technique that improves the quality of an image by stacking images taken at different f-stops in order to improve corner sharpness and overcome blurriness. Once photographs are taken at different f-stops (focus stops), a final complete composite picture is created using only the sharpest portions of the photograph.

6 0
3 years ago
Safety glasses should be worn in which of the following situations?
N76 [4]
When any substance is being heated. Safety glasses
8 0
3 years ago
Having a low credit score can make it more difficult to: Obtain a car loan Open a new credit card Secure an apartment lease All
-Dominant- [34]

Answer:

all of the above

Explanation:

3 0
3 years ago
Other questions:
  • .2. What approach to deviance do you find most persuasive: that
    9·1 answer
  • Alicia uses a software application to store the names, email addresses, and phone numbers of her friends in alphabetical order.
    15·2 answers
  • A blank is the full web Address for particular website<br> (Computer technology)
    14·1 answer
  • Select all that apply.
    13·1 answer
  • ________ is used by text recognition software to convert typed, printed, or handwritten text into the computer-based characters
    15·1 answer
  • Write a program that prompts the user to enter two characters and display the corresponding major and year status. The first cha
    15·1 answer
  • Who can add entries to value log
    8·1 answer
  • The function of anOR gate can best be described as a gate which provides an output of 1 only when
    10·1 answer
  • 14. The heart of a computer is<br> a CPU<br> b. Memory<br> c. I/O Unit<br> d. Disks
    5·1 answer
  • Award documentation is typically required to be prepared and submitted within how long after the end of a project period:_____.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!