CHAPTER 3
Vulnerability Management Activities
This chapter includes questions on the following topics:
• The requirements for a vulnerability management process
• How to determine the frequency of vulnerability scans you need
• The types of vulnerabilities found in various systems
• Considerations when configuring tools for scanning
If someone else can run arbitrary code on your computer, it’s not YOUR computer any more.
–Rich Kulawiec
Before one can manage vulnerabilities, first one must understand what is to be managed. Sadly, you may find numerous opinions regarding the definition/description of a cybersecurity vulnerability. As a cybersecurity analyst, it is absolutely critical that you understand this concept. Vulnerable is ...
Get CompTIA CySA+ Cybersecurity Analyst Certification Practice Exams (Exam CS0-002), 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.