
CySA Module 8 - Security Operations
Authored by Jose Manuel Rios
Information Technology (IT)
9th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Sakura, a cybersecurity analyst, is implementing SCAP for her organization. She wants to implement best practices for the configuration of settings on various computer systems. Which of the following might she use to meet her goal?
CVE
CCE
CPE
CWE
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Clifford, a cybersecurity analyst, has been tasked with implementing a method of automating vulnerability management at his organization. Which of the following is the most likely solution that Clifford would choose to implement?
AVMP
SCAP
SCP
PAM
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Zofia is a cybersecurity analyst for an airline. As part of her day-to-day responsibilities, she needs to ensure that she is cognizant of the same types of threats that other airlines face when analyzing her company's infrastructure. Which of the following should she ensure that she is doing?
Creating APIs
Creating APTs
ETL
Data enrichment
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Maricel works as a development manager for a large organization. She wants to automate as much of the process of making modifications to existing code and pushing them out to the production environment as she possibly can. Which of the following should she learn more about and implement?
Continuous integration
Continuous production
Continuous deployment
Continuous delivery
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Determine when there are anomalies and abnormalities. Which of the following features should he look for in the feature set when looking for a new system to implement?
Machine learning
Zero false positives
Continuous delivery
Augmented reality
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Sanvi is a cybersecurity analyst at her company and has been asked to review a new platform that will combine software programs and tools in order to orchestrate a range of security operations, threat intelligence sources, as well as incident response mechanisms all into one. Which of the following has she been asked to review?
KALI
SOAR
TRIP
SUSE
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Security orchestration, automation, and response is a platform that combines software programs and tools in order to orchestrate a range of security options, threat intelligence sources, and incident response mechanisms. Which of the following is a distribution of Linux that includes a number of software programs and tools, but does not in and of itself provide the orchestration and workflows that SOAR systems do?
KALI Linux
TRIP
SUSE
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?