Chapter 6. Analyzing Scan Output and Identifying Common Vulnerabilities
This chapter covers the following topics:
2.0 Vulnerability Management
2.2 Given a scenario, analyze the output resulting from a vulnerability scan.
Analyze Reports from a Vulnerability Scan: Describes how to review and interpret scan results, including identifying false positives and false negatives and creating exceptions.
Validate Results and Correlate Other Data Points: Covers the validation process including comparison to best practices or compliance, reconciling results, ...
Get CompTIA Cybersecurity Analyst (CySA+) Cert Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.