Search Header Logo

Sec+ - 8D - Vulnerability Analysis and Remediation

Authored by Brock McKinley

Computers

Professional Development

Used 3+ times

Sec+ - 8D - Vulnerability Analysis and Remediation
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term is commonly used to describe up-to-date information about known vulnerabilities?

Vulnerability updates

Patch management

Vulnerability feeds

Security protocols

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which organization maintains the National Vulnerability Database (NVD)?

National Institute of Standards and Technology (NIST)

National Security Agency (NSA)

Federal Bureau of Investigation (FBI)

Cybersecurity and Infrastructure Security Agency (CISA)


3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What protocol facilitates the distribution of vulnerability feeds and defines common identifiers for vulnerabilities?

Common Vulnerability Scoring System (CVSS)

Security Content Automation Protocol (SCAP)

National Vulnerability Database (NVD)

Common Vulnerabilities and Exposures (CVE)


4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which dictionary provides identifiers, descriptions, reference URLs, and creation dates for vulnerabilities?

Common Vulnerabilities and Exposures (CVE)

Common Vulnerability Scoring System (CVSS)

National Vulnerability Database (NVD)

Security Content Automation Protocol (SCAP)


5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What system assigns scores from 0 to 10 to vulnerabilities based on their characteristics?

Common Vulnerability Scoring System (CVSS)

Common Vulnerabilities and Exposures (CVE)

National Vulnerability Database (NVD)

Security Content Automation Protocol (SCAP)


6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term refers to instances where a vulnerability scanner incorrectly identifies a vulnerability?

True positives

False positives

True negatives

False negatives

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which practice involves dividing a network into separate segments to contain potential security breaches?

Patching

Cybersecurity insurance

Segmentation

Compensating controls

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?