CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

9th Grade - Professional Development

20 Qs

quiz-placeholder

Similar activities

Alle verkeersborden

Alle verkeersborden

9th - 12th Grade

20 Qs

Fun with Computer Architecture

Fun with Computer Architecture

University

15 Qs

3rd week g9 summative

3rd week g9 summative

7th - 12th Grade

15 Qs

Average and ages 25th May

Average and ages 25th May

Professional Development

20 Qs

Ulangan DDPPLG

Ulangan DDPPLG

10th Grade

20 Qs

Sustainability

Sustainability

12th Grade - Professional Development

15 Qs

FNaF1

FNaF1

4th - 12th Grade

19 Qs

GEMATMW - Cryptography

GEMATMW - Cryptography

University - Professional Development

16 Qs

CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

Assessment

Quiz

Computers, Professional Development, Instructional Technology

9th Grade - Professional Development

Medium

Created by

MRCOACHRAY RAY

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The presence of _________________ triggers specific vulnerability scanning requirements based upon law or regulation.

​Credit card information

​Protected health information

Personally identifiable information

Trade secret information

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jesus is creating a remediation procedure for vulnerabilities discovered in his organization. He would like to make sure that any vendor patches are tested prior to deploying them in production. What type of environment should be included to best address this issue?

Sandbox

Honeypot

Honeynet

Production

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

James is working on developing a vulnerability scanner program for a large network of sensors that his organization uses to monitor a transcontinental gas pipeline. What term is typically used to describe this type of network?

​WLAN

VPN

P2P

​SCADA

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Timothy’s company is starting a BYOD (bring your own device) policy for all mobile devices. Which of the following allows you to secure the sensitive information on personally owned devices, including administrators, and the ability to remotely wipe corporate information without affecting personal data?

​Remote wipe

Strong passwords

​Biometric authentication

​Containerization

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Patrick is the manager of his organization's vulnerability scanning program. He’s experiencing some issues with scans aborting because the previous day scans are still running when the scanner attempts to start the current scans. Which of the following solutions is least likely to resolve the issue?

Add a new scanner

Reduce the scope of scans

Reduce the sensitivity of scans

Reduce the frequency of scans

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cherish is attempting to determine what systems should be subject to vulnerability scanning and what systems are exempt. She’d like to have a base for this decision relating to the criticality of system to business operations. Where would she find this information?

​The CEO

System names

​IP addresses

​Asset inventory

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TRUE or FALSE: Organizations may decide not to remediate vulnerabilities because of conflicting business requirements.

TRUE

FALSE

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers