SYO 701 VULNERABILITY MANAGEMENT Module FC

SYO 701 VULNERABILITY MANAGEMENT Module FC

University

20 Qs

quiz-placeholder

Similar activities

Module 11

Module 11

9th Grade - Professional Development

20 Qs

030_Operating System Vulnerabilities – CompTIA Security+ SY0-701

030_Operating System Vulnerabilities – CompTIA Security+ SY0-701

9th Grade - University

20 Qs

Information and Communication Technology Security - Pre-Test

Information and Communication Technology Security - Pre-Test

University

20 Qs

Digital Forensics Quiz

Digital Forensics Quiz

University

20 Qs

Review Pertemuan 1 dan 2 - RKS Python

Review Pertemuan 1 dan 2 - RKS Python

University

16 Qs

ASM655  Chapter 1 Quiz

ASM655 Chapter 1 Quiz

University

20 Qs

security+ (601)

security+ (601)

9th Grade - Professional Development

20 Qs

SYO 701 EDR Module FC

SYO 701 EDR Module FC

University

20 Qs

SYO 701 VULNERABILITY MANAGEMENT Module FC

SYO 701 VULNERABILITY MANAGEMENT Module FC

Assessment

Quiz

Computers

University

Hard

Created by

Wayground Content

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

245. Which of the following methods would most likely be used to identify legacy systems?

A. Bug bounty program

B. Vulnerability scan

C. Package monitoring

D. Dynamic analysis

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

41. Which of the following is used to quantitatively measure the criticality of a vulnerability?

A. CVE

B. CVSS

C. CIA

D. CERT

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

313. Which of the following is best to use when determining the severity of a vulnerability?

A. CVE

B. OSINT

C. SOAR

D. CVSS

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

295. An auditor discovered multiple insecure ports on some servers. Other servers were found to have legacy protocols enabled. Which of the following tools did the auditor use to discover these issues?

A. Nessus

B. curl

C. Wireshark

D. netcat

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

627. A company relies on open-source software libraries to build the software used by its customers. Which of the following vulnerability types would be the most difficult to remediate due to the company’s reliance on open-source libraries?

A. Buffer overflow

B. SQL injection

C. Cross-site scripting

D. Zero-day

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

50. A security practitioner completes a vulnerability assessment on a company's network and finds several vulnerabilities, which the operations team remediates. Which of the following should be done next?

A. Conduct an audit.

B. Initiate a penetration test.

C. Rescan the network.

D. Submit a report.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

316. A security analyst is reviewing the logs on an organization's DNS server and notices the following unusual snippet:

 

 

 

Which of the following attack techniques was most likely used?

A. Determining the organization's ISP-assigned address space

B. Bypassing the organization's DNS sinkholing

C. Footprinting the internal network

D. Attempting to achieve initial access to the DNS server

E. Exfiltrating data from fshare.int.complia.org

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?