Podcast
Questions and Answers
When did the Zero Day Initiative begin?
When did the Zero Day Initiative begin?
2005
What is the main purpose of the Zero Day Initiative?
What is the main purpose of the Zero Day Initiative?
To promote the responsible disclosure of vulnerabilities
How does the ZDI process begin?
How does the ZDI process begin?
An external or internal researcher submits a previously unpatched vulnerability to the ZDI
What is the next step after a vulnerability is submitted to the ZDI?
What is the next step after a vulnerability is submitted to the ZDI?
What does the ZDI do when a security flaw is identified in a vendor's product?
What does the ZDI do when a security flaw is identified in a vendor's product?
What does Trend Micro do when a security flaw is identified in a vendor's product?
What does Trend Micro do when a security flaw is identified in a vendor's product?
How long does the vendor have to address the vulnerability with a patch?
How long does the vendor have to address the vulnerability with a patch?
What happens if the vendor is unable or chooses not to patch the vulnerability?
What happens if the vendor is unable or chooses not to patch the vulnerability?
What is the purpose of the Digital Vaccine filter created by Trend Micro?
What is the purpose of the Digital Vaccine filter created by Trend Micro?
What is the common way to refer to the setup wizard?
What is the common way to refer to the setup wizard?
What type of cable is used for the initial setup?
What type of cable is used for the initial setup?
What settings are used for the terminal during initial setup?
What settings are used for the terminal during initial setup?
What are the security settings for the 'None' level?
What are the security settings for the 'None' level?
What is the length requirement for user names at the 'High' security level?
What is the length requirement for user names at the 'High' security level?
What are the password length requirements at the 'Medium' security level?
What are the password length requirements at the 'Medium' security level?
What are the user name and password requirements at the 'Low' security level?
What are the user name and password requirements at the 'Low' security level?
What is created once the security level is set?
What is created once the security level is set?
In the example, what name is used for the initial super user account?
In the example, what name is used for the initial super user account?
What is the typical response time for Actively Exploited Vulnerabilities / Zero Day Vulnerabilities?
What is the typical response time for Actively Exploited Vulnerabilities / Zero Day Vulnerabilities?
When does Trend Micro respond to vulnerabilities after Microsoft Patch Tuesday?
When does Trend Micro respond to vulnerabilities after Microsoft Patch Tuesday?
What is the typical response time for vulnerabilities with a CVSS score of 9.0 - 10.0?
What is the typical response time for vulnerabilities with a CVSS score of 9.0 - 10.0?
What is the typical response time for vulnerabilities with a CVSS score of 7.0 - 9.0?
What is the typical response time for vulnerabilities with a CVSS score of 7.0 - 9.0?
How many network protection filters are available out of the box?
How many network protection filters are available out of the box?
Explain the concept of simple exploit filters.
Explain the concept of simple exploit filters.
What is the main reason for False Positives in IDSs?
What is the main reason for False Positives in IDSs?
How do hardware platforms like Trend Micro's avoid the trade-offs faced by software systems?
How do hardware platforms like Trend Micro's avoid the trade-offs faced by software systems?
Why do IDSs traditionally simplify signatures to the simplest level?
Why do IDSs traditionally simplify signatures to the simplest level?
Flashcards are hidden until you start studying