You have been authorized by management to use a vulnerability scanner once every three months. What is this tool?
CompTIA Security+ 11-20

Quiz
•
Computers
•
Professional Development
•
Hard
Darien Booth
Used 151+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
an application that identifies ports and services that are at risk on a network
an application that identifies ports and services that are at risk on a network
an application that identifies security issues on a network and gives suggestions on how to prevent the issues
an application that detects when network intrusions occur and identifies the appropriate personnel
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
As part of your company's comprehensive vulnerability scanning policy, you decide to perform a passive vulnerability scan on one of your company's subnetworks. Which statement is true of this scan?
It allows a more in-depth analysis than other scan types.
It is limited to a particular operating system.
It impacts the hosts and network less than other scan types.
It includes the appropriate permissions for the different data types.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the goal when you passively test security controls?
Probing for weaknesses
Infiltrating the network
Interfering with business operations
Exploiting weaknesses
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is part of a scan to identify a common misconfiguration?
Packet sniffing
Dictionary attack
Password policy
Router with a default password
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which memory vulnerability is associated with multithreaded applications?
Resource exhaustion
Race condition
DLL injection
Pointer dereferencing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is often the weakest link in the security chain, and represents the largest vulnerability?
End-of-life systems
Untrained users
Lack of vendor support
Embedded systems
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of vulnerability is demonstrated by a SQL injection?
Default configuration
Improper input handling
Misconfiguration/weak configuration
Improper error handling
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
CEH Pre Assessment

Quiz
•
Professional Development
10 questions
Scanning Networks

Quiz
•
Professional Development
15 questions
Sec Practice Quiz

Quiz
•
Professional Development
15 questions
Sec+ Quiz - 2

Quiz
•
Professional Development
10 questions
MOC20703 - Part 2

Quiz
•
Professional Development
10 questions
Networking Basics

Quiz
•
Professional Development
12 questions
AWS Skill Up!

Quiz
•
Professional Development
15 questions
SEC+ Ch.8 Review Test

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade