O'Reilly logo

CompTIA Cybersecurity Analyst (CSA+) Cert Guide by Troy McMillan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Analyzing Scan Output and Identifying Common Vulnerabilities

This chapter covers the following topics:

2.0 Vulnerability Management

2.2 Given a scenario, analyze the output resulting from a vulnerability scan.

Image Analyze Reports from a Vulnerability Scan: Describes how to review and interpret scan results, including identifying false positives and false negatives and creating exceptions.

Image Validate Results and Correlate Other Data Points: Covers the validation process including comparison to best practices or compliance, reconciling results, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required