Search Header Logo

CySa+ PT 4: 2/3

Authored by MRCOACHRAY RAY

Computers, Professional Development, Instructional Technology

9th Grade - Professional Development

Used 3+ times

CySa+ PT 4: 2/3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The presence of _________________ triggers specific vulnerability scanning requirements based upon law or regulation.

​Credit card information

​Protected health information

Personally identifiable information

Trade secret information

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jesus is creating a remediation procedure for vulnerabilities discovered in his organization. He would like to make sure that any vendor patches are tested prior to deploying them in production. What type of environment should be included to best address this issue?

Sandbox

Honeypot

Honeynet

Production

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

James is working on developing a vulnerability scanner program for a large network of sensors that his organization uses to monitor a transcontinental gas pipeline. What term is typically used to describe this type of network?

​WLAN

VPN

P2P

​SCADA

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Timothy’s company is starting a BYOD (bring your own device) policy for all mobile devices. Which of the following allows you to secure the sensitive information on personally owned devices, including administrators, and the ability to remotely wipe corporate information without affecting personal data?

​Remote wipe

Strong passwords

​Biometric authentication

​Containerization

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Patrick is the manager of his organization's vulnerability scanning program. He’s experiencing some issues with scans aborting because the previous day scans are still running when the scanner attempts to start the current scans. Which of the following solutions is least likely to resolve the issue?

Add a new scanner

Reduce the scope of scans

Reduce the sensitivity of scans

Reduce the frequency of scans

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cherish is attempting to determine what systems should be subject to vulnerability scanning and what systems are exempt. She’d like to have a base for this decision relating to the criticality of system to business operations. Where would she find this information?

​The CEO

System names

​IP addresses

​Asset inventory

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TRUE or FALSE: Organizations may decide not to remediate vulnerabilities because of conflicting business requirements.

TRUE

FALSE

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?