CySA Module 3 - Vulnerability Management

CySA Module 3 - Vulnerability Management

9th Grade

18 Qs

quiz-placeholder

Similar activities

Game Soal Informatika Kelas 9

Game Soal Informatika Kelas 9

9th Grade

20 Qs

Les Komputer Internet

Les Komputer Internet

9th Grade

15 Qs

sistem komputer kelas 9

sistem komputer kelas 9

9th Grade - University

20 Qs

Soal AKM Kelas 9 Genap

Soal AKM Kelas 9 Genap

9th Grade

21 Qs

Uji Pengetahuan Teknologi Informasi

Uji Pengetahuan Teknologi Informasi

9th Grade

20 Qs

Quiz Konsep Dasar Jaringan Komputer

Quiz Konsep Dasar Jaringan Komputer

9th Grade

17 Qs

Configurazione di base di un router

Configurazione di base di un router

9th Grade

15 Qs

Business Security Assessment for 9th Grade

Business Security Assessment for 9th Grade

8th Grade - University

20 Qs

CySA Module 3 - Vulnerability Management

CySA Module 3 - Vulnerability Management

Assessment

Quiz

Information Technology (IT)

9th Grade

Hard

Created by

Jose Manuel Rios

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Kendra has a very limited budget but has three critical servers that she needs to secure against data breaches within her company's infrastructure. She knows that she won't be able to protect the entire network, but she has started searching for a solution to secure the most critical assets. Which of the following options would she most likely choose?

UTM appliance

NIPS

Proxy server

HIPS

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Talia has just been hired as the first security employee at an organization. Until this point, security has been everyone's responsibility, but she knows that the IT staff have different skill sets and may not be aware of certain weaknesses within various platforms. Which of the following tools might Talia use to help her determine the state of the existing infrastructure?

NIDS

Vulnerability scanner

OS fingerprinting

Syslog

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cheyenne is concerned about a recent news story that global data breaches are on the rise. She believes that she has installed the latest detection software on all of the servers she is responsible for, but she knows that security requires a layered approach. Which of the following might she also decide to implement?

Proxy server

Spam filter

HIPS

NIPS

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network intrusion prevention system provides protection from data breaches at the network level. A NIPS looks at traffic before it gets to the hosts rather than examining it once the data arrives.

Incorrect

Incorrect

Incorrect

Correct

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A group of doctor's offices have decided to merge into one organization. As part of the migration, the cybersecurity team is responsible for determining how systems from the different offices will be able to share information with each other until they can be formally combined into a single system. Which of the following does the cybersecurity team need to keep in mind throughout the merger as they perform the necessary tasks of combining systems that are specific to the medical field?

FISMA

PCI DSS

MOMA

HIPAA

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Kiah, a cybersecurity analyst for the government, is setting up a new Linux server and needs to configure the data classification labels to be used for the new application. Which of the following are valid labels for U.S. government systems?

Public, secret, top secret

Sensitive but unclassified, classified, secret

Confidential, secret, top secret

Classified, secret, top secret

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ramon has been hired as a consultant for a large corporation to validate its existing security controls. Which of the following would most likely be one of the first pieces of data he requests?

Risk matrix

Asset inventory

Service-level agreement

Operational-level agreement

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?