Go back to EC0-479 - EC-Council Certified Security Analyst (ECSA)

Question :-

Jim performed a vulnerability analysis on his network and found no potential problems. He runs another utility that executes exploits against his system to verify the results of the vulnerability test. The second utility executes five known exploits against his network in which the vulnerability analysis said were not exploitable. What kind of results did Jim receive from his vulnerability analysis?
False negatives
False positives
True negatives
True positives

Want to practice for EC0-479 - EC-Council Certified Security Analyst (ECSA) ? Click here.