Vulnerability Fundamentals VF100B Skills Check
Skills Check Summary
0 of 10 Questions completed
Questions:
Information
You have already completed the skills check before. Hence you can not start it again.
Skills Check is loading…
You must sign in or sign up to start the skills check.
You must first complete the following:
Results
Results
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 10
1. Question
What company makes the Nessus vulnerability scanning tools?
CorrectIncorrect -
Question 2 of 10
2. Question
Nessus uses dynamically compiled what to perform scans?
CorrectIncorrect -
Question 3 of 10
3. Question
Nessus has how many pre-configured templates?
CorrectIncorrect -
Question 4 of 10
4. Question
Nessus after version 10 can even be installed on ARM systems, such as the very popular what?
CorrectIncorrect -
Question 5 of 10
5. Question
What is the tactic of spoofing well-known websites to gather information?
CorrectIncorrect -
Question 6 of 10
6. Question
A strong vulnerability assessment report should have an honest severity assessment of the vulnerabilities.
CorrectIncorrect -
Question 7 of 10
7. Question
Which of the following types of vulnerabilities is primarily concerned with unauthorized data disclosure?
CorrectIncorrect -
Question 8 of 10
8. Question
Which human manipulation technique of social engineering plays on a false sense of time running out?
CorrectIncorrect -
Question 9 of 10
9. Question
What form of phishing targets high-profile or powerful individuals in particular?
CorrectIncorrect -
Question 10 of 10
10. Question
Which protocol does Nessus employ for secure data transmission when accessing the dashboard?
CorrectIncorrect