Search Header Logo

CySA+ Vulnerability Management Lifecycle

Authored by Alison McCartney

Computers

Professional Development

Used 11+ times

CySA+ Vulnerability Management Lifecycle
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

6 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is the Vulnerability Management Lifecycle acroynym

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step of vulnerability management?

Discover

Prioritize

Verify

Assess

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What comes immediately after "Discover"?

Report

Prioritize

Assess

Remediate

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following occur after "Assess"?

Prioritize

Report

Remediate

Verify

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which step should be taken after you report a vulnerability?

Assess

Remediate

Verify

Discover

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the last step in the Vulnerability Managemant Lifecycle?

Assess

Report

Remediate

Verify

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?