One weakness of a vulnerability scanner is that it is not designed to go through filters or bypass security controls like firewalls or intrusion detection systems. Vulnerability scanners typically perform well in identifying known weaknesses within the perimeter of a network or system but might not effectively assess systems that are shielded by robust security measures, which can filter out the scanner's attempts to probe or attack.References:
National Institute of Standards and Technology (NIST), "Technical Guide to Information Security Testing and Assessment".
Question 2
What is a vulnerability called that is released before a patch comes out?
Options:
A.
Initial
B.
Pre-release
C.
Zero day
D.
First
Answer:
C
Explanation:
A vulnerability that is exploited before the vendor has issued a patch or even before the vulnerability is known to the vendor is referred to as a "zero-day" vulnerability. The term "zero-day" refers to the number of days the software vendor has had to address and patch the vulnerability since it was made public—zero, in this case.References:
Symantec Security Response, "Zero Day Initiative".
Question 3
What is the maximum size in bytes of an ethernet packet?
Options:
A.
1200
B.
1400
C.
1500
D.
1300
Answer:
C
Explanation:
The maximum transmission unit (MTU) for Ethernet, which is the largest size of an Ethernet packet or frame that can be sent over the network, is typically 1500 bytes. This size does not include the Ethernet frame's preamble and start frame delimiter but does include all other headers and the payload. Ethernet's MTU of 1500 bytes is a standard for most Ethernet networks, especially those conforming to the IEEE 802.3 standard.References: