
Sec+ - 8D - Vulnerability Analysis and Remediation
Authored by Brock McKinley
Computers
Professional Development
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term is commonly used to describe up-to-date information about known vulnerabilities?
Vulnerability updates
Patch management
Vulnerability feeds
Security protocols
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which organization maintains the National Vulnerability Database (NVD)?
National Institute of Standards and Technology (NIST)
National Security Agency (NSA)
Federal Bureau of Investigation (FBI)
Cybersecurity and Infrastructure Security Agency (CISA)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What protocol facilitates the distribution of vulnerability feeds and defines common identifiers for vulnerabilities?
Common Vulnerability Scoring System (CVSS)
Security Content Automation Protocol (SCAP)
National Vulnerability Database (NVD)
Common Vulnerabilities and Exposures (CVE)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which dictionary provides identifiers, descriptions, reference URLs, and creation dates for vulnerabilities?
Common Vulnerabilities and Exposures (CVE)
Common Vulnerability Scoring System (CVSS)
National Vulnerability Database (NVD)
Security Content Automation Protocol (SCAP)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What system assigns scores from 0 to 10 to vulnerabilities based on their characteristics?
Common Vulnerability Scoring System (CVSS)
Common Vulnerabilities and Exposures (CVE)
National Vulnerability Database (NVD)
Security Content Automation Protocol (SCAP)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term refers to instances where a vulnerability scanner incorrectly identifies a vulnerability?
True positives
False positives
True negatives
False negatives
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which practice involves dividing a network into separate segments to contain potential security breaches?
Patching
Cybersecurity insurance
Segmentation
Compensating controls
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?