CySa+ PT 4: 2/3

Quiz
•
Computers, Professional Development, Instructional Technology
•
9th Grade - Professional Development
•
Medium
MRCOACHRAY RAY
Used 3+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The presence of _________________ triggers specific vulnerability scanning requirements based upon law or regulation.
Credit card information
Protected health information
Personally identifiable information
Trade secret information
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Jesus is creating a remediation procedure for vulnerabilities discovered in his organization. He would like to make sure that any vendor patches are tested prior to deploying them in production. What type of environment should be included to best address this issue?
Sandbox
Honeypot
Honeynet
Production
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
James is working on developing a vulnerability scanner program for a large network of sensors that his organization uses to monitor a transcontinental gas pipeline. What term is typically used to describe this type of network?
WLAN
VPN
P2P
SCADA
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Timothy’s company is starting a BYOD (bring your own device) policy for all mobile devices. Which of the following allows you to secure the sensitive information on personally owned devices, including administrators, and the ability to remotely wipe corporate information without affecting personal data?
Remote wipe
Strong passwords
Biometric authentication
Containerization
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Patrick is the manager of his organization's vulnerability scanning program. He’s experiencing some issues with scans aborting because the previous day scans are still running when the scanner attempts to start the current scans. Which of the following solutions is least likely to resolve the issue?
Add a new scanner
Reduce the scope of scans
Reduce the sensitivity of scans
Reduce the frequency of scans
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Cherish is attempting to determine what systems should be subject to vulnerability scanning and what systems are exempt. She’d like to have a base for this decision relating to the criticality of system to business operations. Where would she find this information?
The CEO
System names
IP addresses
Asset inventory
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
TRUE or FALSE: Organizations may decide not to remediate vulnerabilities because of conflicting business requirements.
TRUE
FALSE
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
Mod 2 Risk Adversity Trust

Quiz
•
9th Grade
15 questions
IT ERA MIDEXAM P4 SET 2

Quiz
•
12th Grade
24 questions
T Level Digital Security Revision

Quiz
•
11th Grade - University
20 questions
GRADE 11 SBIS

Quiz
•
11th Grade
20 questions
032_Cross-site Scripting – CompTIA Security+ SY0-701 – 2.3

Quiz
•
9th Grade - University
25 questions
Cyber Security Quiz

Quiz
•
1st - 10th Grade
22 questions
CO2521 Recap Week 09

Quiz
•
University
20 questions
Ethical Hacking Practice Quiz

Quiz
•
University
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
10 questions
1.2 OSI & TCP IP Models Quiz

Quiz
•
10th Grade
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
30 questions
Introduction to Computers

Quiz
•
8th - 9th Grade
35 questions
Computer Baseline Examination 2025-26

Quiz
•
9th - 12th Grade
13 questions
Problem Solving Process

Quiz
•
9th - 12th Grade
20 questions
Hardware vs. Software Quiz

Quiz
•
7th - 10th Grade
10 questions
Understanding Algorithms with Pseudocode and Flowcharts

Interactive video
•
9th - 12th Grade