CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

9th Grade - Professional Development

20 Qs

quiz-placeholder

Similar activities

CYBER SECURITY QUIZ

CYBER SECURITY QUIZ

10th Grade

20 Qs

Computer Hardware and Software Quiz

Computer Hardware and Software Quiz

12th Grade

19 Qs

Bebras 2014

Bebras 2014

7th - 12th Grade

15 Qs

RIO 2019

RIO 2019

Professional Development

15 Qs

Security and Domain

Security and Domain

Professional Development

20 Qs

CySa+ PT5: 2 of 3

CySa+ PT5: 2 of 3

9th Grade - Professional Development

20 Qs

SEC+ Ch.8 Review Test

SEC+ Ch.8 Review Test

Professional Development

15 Qs

Attacks Threats & Vulnerabilities (C1)

Attacks Threats & Vulnerabilities (C1)

9th - 12th Grade

15 Qs

CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

Assessment

Quiz

Computers, Professional Development, Instructional Technology

9th Grade - Professional Development

Medium

Created by

MRCOACHRAY RAY

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The presence of _________________ triggers specific vulnerability scanning requirements based upon law or regulation.

​Credit card information

​Protected health information

Personally identifiable information

Trade secret information

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jesus is creating a remediation procedure for vulnerabilities discovered in his organization. He would like to make sure that any vendor patches are tested prior to deploying them in production. What type of environment should be included to best address this issue?

Sandbox

Honeypot

Honeynet

Production

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

James is working on developing a vulnerability scanner program for a large network of sensors that his organization uses to monitor a transcontinental gas pipeline. What term is typically used to describe this type of network?

​WLAN

VPN

P2P

​SCADA

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Timothy’s company is starting a BYOD (bring your own device) policy for all mobile devices. Which of the following allows you to secure the sensitive information on personally owned devices, including administrators, and the ability to remotely wipe corporate information without affecting personal data?

​Remote wipe

Strong passwords

​Biometric authentication

​Containerization

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Patrick is the manager of his organization's vulnerability scanning program. He’s experiencing some issues with scans aborting because the previous day scans are still running when the scanner attempts to start the current scans. Which of the following solutions is least likely to resolve the issue?

Add a new scanner

Reduce the scope of scans

Reduce the sensitivity of scans

Reduce the frequency of scans

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cherish is attempting to determine what systems should be subject to vulnerability scanning and what systems are exempt. She’d like to have a base for this decision relating to the criticality of system to business operations. Where would she find this information?

​The CEO

System names

​IP addresses

​Asset inventory

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TRUE or FALSE: Organizations may decide not to remediate vulnerabilities because of conflicting business requirements.

TRUE

FALSE

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?