CySA+

CySA+

Professional Development

15 Qs

quiz-placeholder

Similar activities

Sec+ Quiz - 2

Sec+ Quiz - 2

Professional Development

15 Qs

#02 Incident Response, BC, and DR Concepts

#02 Incident Response, BC, and DR Concepts

Professional Development

10 Qs

Hacker-Powered Security Report 2024-25

Hacker-Powered Security Report 2024-25

Professional Development

10 Qs

Security

Security

Professional Development

20 Qs

AI Cybersecurity Quiz

AI Cybersecurity Quiz

Professional Development

15 Qs

Quiz

Quiz

Professional Development

10 Qs

OWASP Top 10

OWASP Top 10

Professional Development

10 Qs

CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

9th Grade - Professional Development

20 Qs

CySA+

CySA+

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Connor Hach

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A healthcare company prioritizes maintaining the confidentiality of patient data within its systems. A security analyst must prioritize vulnerabilities for remediation based on the CVSS impact metrics for the system. Which of the following vulnerabilities should be given priority for remediation?

Vulnerability CVSS Impact Metrics

1 C:L/I:H/A:H

2 C:H/I:L/A:L

3 C:N/I:H/A:N

4 C:L/I:N/A:H


Vulnerability 1

Vulnerability 2

Vulnerability 3

Vulnerability 4

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A vulnerability is currently being exploited and requires no user interaction or elevated privileges. It significantly impacts integrity and availability but has no effect on confidentiality. Which of the following CVE metrics would best capture the characteristics of this vulnerability?


CVSS:/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

CVSS:/AV:P/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H

CVSS:/AV:A/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L

 CVSS:/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A vulnerability is currently being exploited, requiring no user interaction but demanding elevated privileges. It highly impacts integrity but has no impact availability. It also has a low impact on confidentiality. Which of the following CVE metrics would best capture the characteristics of this vulnerability?


 CVSS:/AV:P/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L

CVSS:/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS:/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:H

CVSS:/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:H/A :N


4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A vulnerability assessment has flagged a critical vulnerability in a web server. The security analyst needs to determine if the vulnerability is a false positive. The initial investigation reveals that the conditions required for the vulnerability to be exploited are not present on the server. What should the security analyst classify this vulnerability as?


True Positive

False Positive

True Negative

False Negative

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company uses a proprietary application critical to its operations. A recent vulnerability scan shows a medium-severity vulnerability in the application. However, the application's role in business operations significantly increases its value to the company. How should the security analyst prioritize this vulnerability?


Low priority

Medium priority

High priority

Ignore the vulnerability

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst is compiling a report to communicate the status of vulnerabilities discovered during the latest vulnerability scan. The report includes information about the vulnerabilities, affected hosts, and their associated risk scores. What aspect of vulnerability management reporting involves providing information about the vulnerabilities discovered, affected hosts, and their associated risk scores?

Compliance reports

Action plans

Metrics and KPI's

Vulnerability management reporting

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An organization is required to adhere to certain regulatory standards and frameworks. As part of compliance efforts, the security team generates reports detailing the organization's adherence to these standards. What type of reports are generated to demonstrate adherence to regulatory standards and frameworks?


Vulnerability management reporting

Compliance reports

Action plans

Metrics and KPI's

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?