Chapter 5 Review

Chapter 5 Review

University

20 Qs

quiz-placeholder

Similar activities

Module 1.1: Common Threats

Module 1.1: Common Threats

11th Grade - University

25 Qs

Cybersecurity Exam 2 Practice

Cybersecurity Exam 2 Practice

University

23 Qs

Cybersecurity Threats and Attacks Quiz

Cybersecurity Threats and Attacks Quiz

University

25 Qs

NETWORK SECURITY

NETWORK SECURITY

University

20 Qs

TSI Quiz Chp 4

TSI Quiz Chp 4

University

20 Qs

Introduction to Penetration Testing

Introduction to Penetration Testing

University

20 Qs

Data Model Using Spreadsheet

Data Model Using Spreadsheet

12th Grade - University

15 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

18 Qs

Chapter 5 Review

Chapter 5 Review

Assessment

Quiz

Computers

University

Hard

Created by

Laura Aronson

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

weakness

attack

protection

asset

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is this called?​

Vulnerability Life Cycle
Attack Life Cycle
Risk Management Life Cycle
Hacker Research Life Cycle

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

______ is used to detect new vulnerabilities as they arise and then implement a remediation workflow that addresses the highest-priority vulnerabilities.

Patch Scanning

Legacy Scanning

Vulnerability Scanning

Error Scanning

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is this a picture of?

Vulnerabilities map

Employee map

Asset map

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Administrators should configure these scans to provide automated alerting when they detect new vulnerabilities. Which company's Scan Report was used as an example in the curriculum?

Nessux

Qualys

Nessus

Qualicort

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

______, such as those imposed by the Payment Card Industry Data Security Standard (PCI DSS) or the Federal Information Security Modernization Act (FISMA), may dictate a minimum frequency for vulnerability scans.

Technical Constraints

Regulatory Requirements

Business Constraints

Licensing Limitations

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

______, may limit the organization from conducting resource-intensive vulnerability scans during periods of high business activity to avoid disruption of critical processes.

Technical Constraints

Regulatory Requirements

Business Constraints

Licensing Limitations

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?