Search Header Logo

CySA Module 3 - Vulnerability Management

Authored by Jose Manuel Rios

Information Technology (IT)

9th Grade

CySA Module 3 - Vulnerability Management
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Kendra has a very limited budget but has three critical servers that she needs to secure against data breaches within her company's infrastructure. She knows that she won't be able to protect the entire network, but she has started searching for a solution to secure the most critical assets. Which of the following options would she most likely choose?

UTM appliance

NIPS

Proxy server

HIPS

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Talia has just been hired as the first security employee at an organization. Until this point, security has been everyone's responsibility, but she knows that the IT staff have different skill sets and may not be aware of certain weaknesses within various platforms. Which of the following tools might Talia use to help her determine the state of the existing infrastructure?

NIDS

Vulnerability scanner

OS fingerprinting

Syslog

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cheyenne is concerned about a recent news story that global data breaches are on the rise. She believes that she has installed the latest detection software on all of the servers she is responsible for, but she knows that security requires a layered approach. Which of the following might she also decide to implement?

Proxy server

Spam filter

HIPS

NIPS

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network intrusion prevention system provides protection from data breaches at the network level. A NIPS looks at traffic before it gets to the hosts rather than examining it once the data arrives.

Incorrect

Incorrect

Incorrect

Correct

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A group of doctor's offices have decided to merge into one organization. As part of the migration, the cybersecurity team is responsible for determining how systems from the different offices will be able to share information with each other until they can be formally combined into a single system. Which of the following does the cybersecurity team need to keep in mind throughout the merger as they perform the necessary tasks of combining systems that are specific to the medical field?

FISMA

PCI DSS

MOMA

HIPAA

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Kiah, a cybersecurity analyst for the government, is setting up a new Linux server and needs to configure the data classification labels to be used for the new application. Which of the following are valid labels for U.S. government systems?

Public, secret, top secret

Sensitive but unclassified, classified, secret

Confidential, secret, top secret

Classified, secret, top secret

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ramon has been hired as a consultant for a large corporation to validate its existing security controls. Which of the following would most likely be one of the first pieces of data he requests?

Risk matrix

Asset inventory

Service-level agreement

Operational-level agreement

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?