CySa+ PT 4: 2/3
Quiz
•
Computers, Professional Development, Instructional Technology
•
9th Grade - Professional Development
•
Practice Problem
•
Medium
MRCOACHRAY RAY
Used 3+ times
FREE Resource
Enhance your content in a minute
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The presence of _________________ triggers specific vulnerability scanning requirements based upon law or regulation.
Credit card information
Protected health information
Personally identifiable information
Trade secret information
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Jesus is creating a remediation procedure for vulnerabilities discovered in his organization. He would like to make sure that any vendor patches are tested prior to deploying them in production. What type of environment should be included to best address this issue?
Sandbox
Honeypot
Honeynet
Production
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
James is working on developing a vulnerability scanner program for a large network of sensors that his organization uses to monitor a transcontinental gas pipeline. What term is typically used to describe this type of network?
WLAN
VPN
P2P
SCADA
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Timothy’s company is starting a BYOD (bring your own device) policy for all mobile devices. Which of the following allows you to secure the sensitive information on personally owned devices, including administrators, and the ability to remotely wipe corporate information without affecting personal data?
Remote wipe
Strong passwords
Biometric authentication
Containerization
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Patrick is the manager of his organization's vulnerability scanning program. He’s experiencing some issues with scans aborting because the previous day scans are still running when the scanner attempts to start the current scans. Which of the following solutions is least likely to resolve the issue?
Add a new scanner
Reduce the scope of scans
Reduce the sensitivity of scans
Reduce the frequency of scans
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Cherish is attempting to determine what systems should be subject to vulnerability scanning and what systems are exempt. She’d like to have a base for this decision relating to the criticality of system to business operations. Where would she find this information?
The CEO
System names
IP addresses
Asset inventory
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
TRUE or FALSE: Organizations may decide not to remediate vulnerabilities because of conflicting business requirements.
TRUE
FALSE
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
18 questions
Infallible Vedas (DYS 2)
Quiz
•
Professional Development
19 questions
UNIT 1.2 MEMORY
Quiz
•
10th Grade
15 questions
After Effect Intoduction
Quiz
•
10th Grade - University
18 questions
Memory-Mobo-Hard/Software
Quiz
•
University
20 questions
PARC Linux Basic Part 2
Quiz
•
University
18 questions
SQL Quiz
Quiz
•
University
15 questions
Jira
Quiz
•
University
20 questions
Petrochina Quiz
Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
