
CySa+ PT 4: 2/3
Authored by MRCOACHRAY RAY
Computers, Professional Development, Instructional Technology
9th Grade - Professional Development
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The presence of _________________ triggers specific vulnerability scanning requirements based upon law or regulation.
Credit card information
Protected health information
Personally identifiable information
Trade secret information
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Jesus is creating a remediation procedure for vulnerabilities discovered in his organization. He would like to make sure that any vendor patches are tested prior to deploying them in production. What type of environment should be included to best address this issue?
Sandbox
Honeypot
Honeynet
Production
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
James is working on developing a vulnerability scanner program for a large network of sensors that his organization uses to monitor a transcontinental gas pipeline. What term is typically used to describe this type of network?
WLAN
VPN
P2P
SCADA
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Timothy’s company is starting a BYOD (bring your own device) policy for all mobile devices. Which of the following allows you to secure the sensitive information on personally owned devices, including administrators, and the ability to remotely wipe corporate information without affecting personal data?
Remote wipe
Strong passwords
Biometric authentication
Containerization
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Patrick is the manager of his organization's vulnerability scanning program. He’s experiencing some issues with scans aborting because the previous day scans are still running when the scanner attempts to start the current scans. Which of the following solutions is least likely to resolve the issue?
Add a new scanner
Reduce the scope of scans
Reduce the sensitivity of scans
Reduce the frequency of scans
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Cherish is attempting to determine what systems should be subject to vulnerability scanning and what systems are exempt. She’d like to have a base for this decision relating to the criticality of system to business operations. Where would she find this information?
The CEO
System names
IP addresses
Asset inventory
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
TRUE or FALSE: Organizations may decide not to remediate vulnerabilities because of conflicting business requirements.
TRUE
FALSE
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Petrochina Quiz
Quiz
•
Professional Development
18 questions
Infallible Vedas (DYS 2)
Quiz
•
Professional Development
19 questions
UNIT 1.2 MEMORY
Quiz
•
10th Grade
15 questions
After Effect Intoduction
Quiz
•
10th Grade - University
18 questions
Memory-Mobo-Hard/Software
Quiz
•
University
20 questions
PARC Linux Basic Part 2
Quiz
•
University
18 questions
SQL Quiz
Quiz
•
University
21 questions
Visual Basic Assessment
Quiz
•
11th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade