A primary mailing list for new vulnerabilities, called simply __________, provides time-sensitive coverage of emerging vulnerabilities, documenting how they are exploited and reporting on how to remediate them. Individuals can register for the flagship mailing list or any one of the entire family of its mailing lists.

A. Bugs
B. Bugfix
C. Buglist
D. Bugtraq

Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following is the major issue with a ping scan?

a. It is easy to detect. b. It will not identify open ports. c. Many firewalls block ICMP packets so the scan might not be successful. d. The scan produces many false negatives and false positives.

Computer Science & Information Technology

Chained exceptions are useful for finding out about ________.

a. exceptions thrown using the chained keyword. b. checked exceptions only. c. an original exception that was caught before the current exception was thrown. d. the current exception’s chain of superclasses.

Computer Science & Information Technology