A recent zero-day vulnerability is being actively exploited, requires no user interaction or privilege escalation, and has a significant impact to confidentiality and integrity but not to availability. Which of the following CVE metrics would be most accurate for this zero-day threat?
Correct Answer:
A
🗳️
Which of the following tools would work best to prevent the exposure of PII outside of an organization?
Correct Answer:
D
🗳️
An organization conducted a web application vulnerability assessment against the corporate website, and the following output was observed:
Which of the following tuning recommendations should the security analyst share?
Correct Answer:
B
🗳️
Which of the following items should be included in a vulnerability scan report? (Choose two.)
Correct Answer:
DE
🗳️