The process of continuously monitoring systems for vulnerabilities and applying necessary patches is known as _______.
- Firewall Configuration
- Intrusion Detection
- Penetration Testing
- Vulnerability Management
Vulnerability Management involves the systematic process of identifying and addressing vulnerabilities in a network or system. It includes vulnerability scanning, assessment, and patch management to ensure that the system is protected from known vulnerabilities.
Loading...
Related Quiz
- Multi-factor authentication typically involves how many different forms of evidence (or factors) for verifying a user's identity?
- Which layer of the OSI model does SSL/TLS primarily operate at?
- The act of monitoring and potentially manipulating network traffic to extract information or disrupt the communication is known as _______.
- What encryption technique involves two interdependent cryptographic keys, one public and one private?
- Which header is used to define a Content Security Policy for a web application?