HOTSPOT -
A security analyst performs various types of vulnerability scans.
Review the vulnerability scan results to determine the type of scan that was executed and if a false positive occurred for each device.
INSTRUCTIONS -
Select the Results Generated drop-down option to determine if the results were generated from a credentialed scan, non-credentialed scan, or a compliance scan.
For ONLY the credentialed and non-credentialed scans, evaluate the results for False Positives and check the Findings that display false positives.
NOTE: If you would like to uncheck an option that is currently selected, click on the option a second time.
Lastly, based on the vulnerability scan results, identify the type of Server by dragging the Server to the results. The Linux Web Server, File-Print Server, and
Directory Server are draggable.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Hot Area:
db97
Highly Voted 1 year, 9 months agokhrid4
1 year, 8 months agoZUL01
1 year, 6 months agodb97
1 year, 9 months agomraval
1 year, 8 months agoWeezyfbaby
Highly Voted 2 years, 1 month agoSolventCourseisSCAM
2 years, 1 month agoStarburst
Most Recent 1 year, 5 months agoZUL01
1 year, 6 months agodb97
1 year, 9 months agoZUL01
1 year, 6 months agodavid124
1 year, 9 months agoJoshgip95
1 year, 9 months agoIanRogerStewart
1 year, 10 months agocatastrophie
1 year, 9 months agoSylFlo
1 year, 10 months agoSOL_Z
1 year, 10 months agoMrRobotJ
2 years agolordguck
1 year, 11 months agoVanicream
2 years agodb97
1 year, 9 months agomandimus
2 years agoJoshgip95
1 year, 9 months agojchutch2
2 years, 1 month agoR00ted
2 years, 2 months agojchutch2
2 years, 1 month agoR00ted
2 years, 1 month agodb97
1 year, 9 months agocatastrophie
1 year, 9 months ago2Fish
1 year, 8 months ago2Fish
1 year, 8 months agoLaudy
2 years, 2 months ago