CyberOps Chap23

CyberOps Chap23

University

10 Qs

quiz-placeholder

Similar activities

Risk Management

Risk Management

University

9 Qs

Physical Security

Physical Security

1st Grade - University

10 Qs

Information Assurance & Security

Information Assurance & Security

University

10 Qs

Metasploit Quiz

Metasploit Quiz

University

10 Qs

Cybersecurity Fundamentals Quiz

Cybersecurity Fundamentals Quiz

10th Grade - University

15 Qs

security+ (601)

security+ (601)

9th Grade - Professional Development

15 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

CH 4 - PLANNING FOR SECURITY

CH 4 - PLANNING FOR SECURITY

University

10 Qs

CyberOps Chap23

CyberOps Chap23

Assessment

Quiz

Computers

University

Medium

Created by

Monarjay Malbog

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In profiling a server, what defines what an application is allowed to do or run on a server?

Software environment

Service accounts

Logged in users and accounts

Listening ports

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which metric class in the CVSS Basic Metric Group identifies the impacts on confidentiality, integrity, and availability?

Impact

Exploitability

Exploit Code Maturity

Modified Base

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When establishing a server profile for an organization, which element describes the type of service that an application is allowed to run on the server?

Listening ports

User Account

Service accounts

Software environment

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the steps in the vulnerability management life cycle?

detect, analyze, recover, respond

identify, protect, detect, respond,recover

plan, do, act, check

discover, prioritize assets, assess, report, remediate, verify

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security management function is concerned with the inventory and control of hardware and software configurations of systems?

Risk Management

Vulnerability Assessment

Asset Management

Configuration Managemenet

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In addressing an identified risk, which strategy aims to decrease the risk by taking measures to reduce vulnerability?

Risk Retention

Risk Sharing

Risk Avoidance

Risk Reduction

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which step in the Vulnerability Management Life Cycle performs inventory of all assets across the network and identifies host details, including operating system and open services?

Assess

Remediate

Discover

Prioritize Asset

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?