CySa+ PT 4: 2/3
Quiz
•
Computers, Professional Development, Instructional Technology
•
9th Grade - Professional Development
•
Medium
MRCOACHRAY RAY
Used 3+ times
FREE Resource
Enhance your content in a minute
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The presence of _________________ triggers specific vulnerability scanning requirements based upon law or regulation.
Credit card information
Protected health information
Personally identifiable information
Trade secret information
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Jesus is creating a remediation procedure for vulnerabilities discovered in his organization. He would like to make sure that any vendor patches are tested prior to deploying them in production. What type of environment should be included to best address this issue?
Sandbox
Honeypot
Honeynet
Production
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
James is working on developing a vulnerability scanner program for a large network of sensors that his organization uses to monitor a transcontinental gas pipeline. What term is typically used to describe this type of network?
WLAN
VPN
P2P
SCADA
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Timothy’s company is starting a BYOD (bring your own device) policy for all mobile devices. Which of the following allows you to secure the sensitive information on personally owned devices, including administrators, and the ability to remotely wipe corporate information without affecting personal data?
Remote wipe
Strong passwords
Biometric authentication
Containerization
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Patrick is the manager of his organization's vulnerability scanning program. He’s experiencing some issues with scans aborting because the previous day scans are still running when the scanner attempts to start the current scans. Which of the following solutions is least likely to resolve the issue?
Add a new scanner
Reduce the scope of scans
Reduce the sensitivity of scans
Reduce the frequency of scans
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Cherish is attempting to determine what systems should be subject to vulnerability scanning and what systems are exempt. She’d like to have a base for this decision relating to the criticality of system to business operations. Where would she find this information?
The CEO
System names
IP addresses
Asset inventory
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
TRUE or FALSE: Organizations may decide not to remediate vulnerabilities because of conflicting business requirements.
TRUE
FALSE
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
15 questions
POSTES MANAJERIAL - INTEGRITAS
Quiz
•
University
15 questions
Coding Quiz
Quiz
•
6th - 10th Grade
20 questions
2.3.1 Graph Traversal & Path Finding Algorithms
Quiz
•
12th Grade - University
17 questions
Mobile app development principles
Quiz
•
10th Grade
15 questions
Robotics Prelim
Quiz
•
University
19 questions
redemption quiz in anaphy
Quiz
•
University
20 questions
PSTS Administrasi Infrastruktur Jaringan Kelas XII TKJ
Quiz
•
12th Grade
17 questions
Security and Ethics
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
20 questions
Halloween Trivia
Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Order of Operations
Quiz
•
5th Grade
20 questions
Halloween
Quiz
•
5th Grade
16 questions
Halloween
Quiz
•
3rd Grade
12 questions
It's The Great Pumpkin Charlie Brown
Quiz
•
1st - 5th Grade
20 questions
Possessive Nouns
Quiz
•
5th Grade
10 questions
Halloween Traditions and Origins
Interactive video
•
5th - 10th Grade
