in Education by
____________ is the cyclic practice for identifying & classifying and then solving the vulnerabilities in a system. (a) Bug protection (b) Bug bounty (c) Vulnerability measurement (d) Vulnerability management The question was posed to me in quiz. My question comes from Bugs and Vulnerabilities topic in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Correct option is (d) Vulnerability management To elaborate: Vulnerability management is a cyclic process for identifying & classifying and then solving the vulnerabilities in a system. This term is generally used in software vulnerability detection and resolving process.

Related questions

0 votes
0 votes
    Performing a shoulder surfing in order to check other's password is ____________ ethical practice. (a) a good (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    ____________ work in background & keeps on downloading other malicious programs when the system is online. (a) ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    In __________ phase the hacker exploits the network or system vulnerabilities. (a) Scanning (b) Maintaining access (c) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Fixing of security vulnerabilities in a system by additional programs is known as __________ patches. (a) hacking (b) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    ____________ is an application which now comes built-in Windows OS & it allows Windows users to encrypt all ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    ____________ is an attack where the attacker is able to guess together with the sequence number of an in progress ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
...