Jim performed a vulnerability analysis on his network and found no potential problems. He runs another utility
that executes exploits against his system to verify the results of the vulnerability test.
The second utility executes five known exploits against his network in which the vulnerability analysis said were
not exploitable. What kind of results did Jim receive from his vulnerability analysis?

A.
False negatives
B.
False positives
C.
True negatives
D.
True positives
False negative: an error in which a test result improperly indicates no presence of a condition (the result is negative), when in reality it is present.