ECCouncil Computer Hacking Forensic Investigator 312-49 Question # 97 Topic 10 Discussion

ECCouncil Computer Hacking Forensic Investigator 312-49 Question # 97 Topic 10 Discussion

312-49 Exam Topic 10 Question 97 Discussion:
Question #: 97
Topic #: 10

Jim performed a vulnerability analysis on his network and found no potential problems. He runs another utility that executes exploits against his system to verify the results of the vulnerability test.

The second utility executes five known exploits against his network in which the vulnerability analysis said were not exploitable. What kind of results did Jim receive from his vulnerability analysis?


A.

False negatives


B.

False positives


C.

True negatives


D.

True positives


Get Premium 312-49 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.