Podcast
Questions and Answers
When did the Zero Day Initiative begin?
When did the Zero Day Initiative begin?
2005
What is the main purpose of the Zero Day Initiative?
What is the main purpose of the Zero Day Initiative?
To promote the responsible disclosure of vulnerabilities
How does the ZDI process begin?
How does the ZDI process begin?
An external or internal researcher submits a previously unpatched vulnerability to the ZDI
What is the next step after a vulnerability is submitted to the ZDI?
What is the next step after a vulnerability is submitted to the ZDI?
Signup and view all the answers
What does the ZDI do when a security flaw is identified in a vendor's product?
What does the ZDI do when a security flaw is identified in a vendor's product?
Signup and view all the answers
What does Trend Micro do when a security flaw is identified in a vendor's product?
What does Trend Micro do when a security flaw is identified in a vendor's product?
Signup and view all the answers
How long does the vendor have to address the vulnerability with a patch?
How long does the vendor have to address the vulnerability with a patch?
Signup and view all the answers
What happens if the vendor is unable or chooses not to patch the vulnerability?
What happens if the vendor is unable or chooses not to patch the vulnerability?
Signup and view all the answers
What is the purpose of the Digital Vaccine filter created by Trend Micro?
What is the purpose of the Digital Vaccine filter created by Trend Micro?
Signup and view all the answers
What is the common way to refer to the setup wizard?
What is the common way to refer to the setup wizard?
Signup and view all the answers
What type of cable is used for the initial setup?
What type of cable is used for the initial setup?
Signup and view all the answers
What settings are used for the terminal during initial setup?
What settings are used for the terminal during initial setup?
Signup and view all the answers
What are the security settings for the 'None' level?
What are the security settings for the 'None' level?
Signup and view all the answers
What is the length requirement for user names at the 'High' security level?
What is the length requirement for user names at the 'High' security level?
Signup and view all the answers
What are the password length requirements at the 'Medium' security level?
What are the password length requirements at the 'Medium' security level?
Signup and view all the answers
What are the user name and password requirements at the 'Low' security level?
What are the user name and password requirements at the 'Low' security level?
Signup and view all the answers
What is created once the security level is set?
What is created once the security level is set?
Signup and view all the answers
In the example, what name is used for the initial super user account?
In the example, what name is used for the initial super user account?
Signup and view all the answers
What is the typical response time for Actively Exploited Vulnerabilities / Zero Day Vulnerabilities?
What is the typical response time for Actively Exploited Vulnerabilities / Zero Day Vulnerabilities?
Signup and view all the answers
When does Trend Micro respond to vulnerabilities after Microsoft Patch Tuesday?
When does Trend Micro respond to vulnerabilities after Microsoft Patch Tuesday?
Signup and view all the answers
What is the typical response time for vulnerabilities with a CVSS score of 9.0 - 10.0?
What is the typical response time for vulnerabilities with a CVSS score of 9.0 - 10.0?
Signup and view all the answers
What is the typical response time for vulnerabilities with a CVSS score of 7.0 - 9.0?
What is the typical response time for vulnerabilities with a CVSS score of 7.0 - 9.0?
Signup and view all the answers
How many network protection filters are available out of the box?
How many network protection filters are available out of the box?
Signup and view all the answers
Explain the concept of simple exploit filters.
Explain the concept of simple exploit filters.
Signup and view all the answers
What is the main reason for False Positives in IDSs?
What is the main reason for False Positives in IDSs?
Signup and view all the answers
How do hardware platforms like Trend Micro's avoid the trade-offs faced by software systems?
How do hardware platforms like Trend Micro's avoid the trade-offs faced by software systems?
Signup and view all the answers
Why do IDSs traditionally simplify signatures to the simplest level?
Why do IDSs traditionally simplify signatures to the simplest level?
Signup and view all the answers