What is the best source for obtaining vulnerability checklists for a particular operating system?
a. Friends and family
b. The operating system manufacturer
c. Unknown Internet sites
d. Books and periodicals
e. Cracker/hacker Web sites
Answer: b. The operating system manufacturer