CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

9th Grade - Professional Development

20 Qs

quiz-placeholder

Similar activities

Sec+ Quiz - 2

Sec+ Quiz - 2

Professional Development

15 Qs

Principles of Security

Principles of Security

University

20 Qs

Cyber Security

Cyber Security

9th Grade - University

20 Qs

OCR IT. Unit 3 - Cyber Security. LO2 test:

OCR IT. Unit 3 - Cyber Security. LO2 test:

11th - 12th Grade

20 Qs

CVE System Quiz

CVE System Quiz

11th Grade

15 Qs

2B. Active Reconnaissance - Enumeration

2B. Active Reconnaissance - Enumeration

University

24 Qs

Lesson 5.2 Conducting an InfoSec Risk Assessment

Lesson 5.2 Conducting an InfoSec Risk Assessment

Professional Development

15 Qs

IAS 101 - Activity 3

IAS 101 - Activity 3

University

20 Qs

CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

Assessment

Quiz

Computers, Professional Development, Instructional Technology

9th Grade - Professional Development

Medium

Created by

MRCOACHRAY RAY

Used 3+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The presence of _________________ triggers specific vulnerability scanning requirements based upon law or regulation.

​Credit card information

​Protected health information

Personally identifiable information

Trade secret information

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jesus is creating a remediation procedure for vulnerabilities discovered in his organization. He would like to make sure that any vendor patches are tested prior to deploying them in production. What type of environment should be included to best address this issue?

Sandbox

Honeypot

Honeynet

Production

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

James is working on developing a vulnerability scanner program for a large network of sensors that his organization uses to monitor a transcontinental gas pipeline. What term is typically used to describe this type of network?

​WLAN

VPN

P2P

​SCADA

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Timothy’s company is starting a BYOD (bring your own device) policy for all mobile devices. Which of the following allows you to secure the sensitive information on personally owned devices, including administrators, and the ability to remotely wipe corporate information without affecting personal data?

​Remote wipe

Strong passwords

​Biometric authentication

​Containerization

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Patrick is the manager of his organization's vulnerability scanning program. He’s experiencing some issues with scans aborting because the previous day scans are still running when the scanner attempts to start the current scans. Which of the following solutions is least likely to resolve the issue?

Add a new scanner

Reduce the scope of scans

Reduce the sensitivity of scans

Reduce the frequency of scans

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cherish is attempting to determine what systems should be subject to vulnerability scanning and what systems are exempt. She’d like to have a base for this decision relating to the criticality of system to business operations. Where would she find this information?

​The CEO

System names

​IP addresses

​Asset inventory

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TRUE or FALSE: Organizations may decide not to remediate vulnerabilities because of conflicting business requirements.

TRUE

FALSE

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?