Chapter 5 Review

Chapter 5 Review

University

20 Qs

quiz-placeholder

Similar activities

Design Principles/Cognitive and Affective

Design Principles/Cognitive and Affective

University

20 Qs

Kalasag Hacker's Night Game Time

Kalasag Hacker's Night Game Time

KG - Professional Development

15 Qs

Varitey of Requirments 2

Varitey of Requirments 2

University

15 Qs

IWP Digital Assignment 3

IWP Digital Assignment 3

University

15 Qs

Chapter 2- Malicious Code

Chapter 2- Malicious Code

University

15 Qs

Nmap Options, Host Discovery, and Port Scanning

Nmap Options, Host Discovery, and Port Scanning

6th Grade - University

16 Qs

SCSU

SCSU

1st Grade - Professional Development

20 Qs

Operating systems

Operating systems

10th Grade - University

20 Qs

Chapter 5 Review

Chapter 5 Review

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Laura Aronson

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

weakness

attack

protection

asset

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is this called?​

Vulnerability Life Cycle
Attack Life Cycle
Risk Management Life Cycle
Hacker Research Life Cycle

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

______ is used to detect new vulnerabilities as they arise and then implement a remediation workflow that addresses the highest-priority vulnerabilities.

Patch Scanning

Legacy Scanning

Vulnerability Scanning

Error Scanning

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is this a picture of?

Vulnerabilities map

Employee map

Asset map

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Administrators should configure these scans to provide automated alerting when they detect new vulnerabilities. Which company's Scan Report was used as an example in the curriculum?

Nessux

Qualys

Nessus

Qualicort

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

______, such as those imposed by the Payment Card Industry Data Security Standard (PCI DSS) or the Federal Information Security Modernization Act (FISMA), may dictate a minimum frequency for vulnerability scans.

Technical Constraints

Regulatory Requirements

Business Constraints

Licensing Limitations

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

______, may limit the organization from conducting resource-intensive vulnerability scans during periods of high business activity to avoid disruption of critical processes.

Technical Constraints

Regulatory Requirements

Business Constraints

Licensing Limitations

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?