VM Quiz

VM Quiz

University

13 Qs

quiz-placeholder

Similar activities

THM Indore

THM Indore

University

12 Qs

Cybersecurity Fundamentals Quiz

Cybersecurity Fundamentals Quiz

10th Grade - University

15 Qs

Cybersecurity Ess

Cybersecurity Ess

University

10 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

Cyber Security Essentials

Cyber Security Essentials

University

10 Qs

SUBMARINE LIFE

SUBMARINE LIFE

10th Grade - Professional Development

10 Qs

Cloud Computing Quiz 5

Cloud Computing Quiz 5

KG - University

13 Qs

IT Ethics, impact and security

IT Ethics, impact and security

University

16 Qs

VM Quiz

VM Quiz

Assessment

Quiz

Computers

University

Hard

Created by

Josh Ebreo

Used 2+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which step of the vulnerability management lifecycle performs fixes through software patches and approved upgrades?

Discovery

Reporting

Remediation

Assessment

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term describes an actual vulnerability that exists, but was NOT detected?

False Positives

False Negative

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which step of the vulnerability management lifecycle includes summary of findings and remediations?

Discovery

Reporting

Remediation

Assessment

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which step of the vulnerability management lifecycle includes identifying areas of responsibility and system criticality?

Prioritize Assets

Reporting

Remediation

Assessment

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term describes a situation where a vulnerability is identified, but does NOT reflect a threat to your organization?

False Positives

False Negative

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which option is NOT a software used for Vulnerability Management?

OpenVAS

Nessus Enterprise

CVSS

Security Onion

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This open standard provides a reference method for publicly known information-security vulnerabilities and exposures

CCE

OVAL

CPE

CVE

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?