
CySA+

Quiz
•
Computers
•
Professional Development
•
Medium
Connor Hach
Used 1+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A healthcare company prioritizes maintaining the confidentiality of patient data within its systems. A security analyst must prioritize vulnerabilities for remediation based on the CVSS impact metrics for the system. Which of the following vulnerabilities should be given priority for remediation?
Vulnerability CVSS Impact Metrics
1 C:L/I:H/A:H
2 C:H/I:L/A:L
3 C:N/I:H/A:N
4 C:L/I:N/A:H
Vulnerability 1
Vulnerability 2
Vulnerability 3
Vulnerability 4
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A vulnerability is currently being exploited and requires no user interaction or elevated privileges. It significantly impacts integrity and availability but has no effect on confidentiality. Which of the following CVE metrics would best capture the characteristics of this vulnerability?
CVSS:/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVSS:/AV:P/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H
CVSS:/AV:A/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L
CVSS:/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A vulnerability is currently being exploited, requiring no user interaction but demanding elevated privileges. It highly impacts integrity but has no impact availability. It also has a low impact on confidentiality. Which of the following CVE metrics would best capture the characteristics of this vulnerability?
CVSS:/AV:P/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L
CVSS:/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS:/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:H
CVSS:/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:H/A :N
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A vulnerability assessment has flagged a critical vulnerability in a web server. The security analyst needs to determine if the vulnerability is a false positive. The initial investigation reveals that the conditions required for the vulnerability to be exploited are not present on the server. What should the security analyst classify this vulnerability as?
True Positive
False Positive
True Negative
False Negative
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A company uses a proprietary application critical to its operations. A recent vulnerability scan shows a medium-severity vulnerability in the application. However, the application's role in business operations significantly increases its value to the company. How should the security analyst prioritize this vulnerability?
Low priority
Medium priority
High priority
Ignore the vulnerability
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A security analyst is compiling a report to communicate the status of vulnerabilities discovered during the latest vulnerability scan. The report includes information about the vulnerabilities, affected hosts, and their associated risk scores. What aspect of vulnerability management reporting involves providing information about the vulnerabilities discovered, affected hosts, and their associated risk scores?
Compliance reports
Action plans
Metrics and KPI's
Vulnerability management reporting
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An organization is required to adhere to certain regulatory standards and frameworks. As part of compliance efforts, the security team generates reports detailing the organization's adherence to these standards. What type of reports are generated to demonstrate adherence to regulatory standards and frameworks?
Vulnerability management reporting
Compliance reports
Action plans
Metrics and KPI's
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Sec Practice Quiz

Quiz
•
Professional Development
10 questions
Cyberops quiz

Quiz
•
Professional Development
10 questions
MOC20703 - Part 2

Quiz
•
Professional Development
15 questions
SEC+ Ch.8 Review Test

Quiz
•
Professional Development
12 questions
Security I - Day 3 - Review of Day 2

Quiz
•
Professional Development
10 questions
CompTIA Security+ 11-20

Quiz
•
Professional Development
15 questions
Cyber Security Fundamentals

Quiz
•
Professional Development
10 questions
Blockchain Technology and Cryptocurrencies

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
11 questions
All about me

Quiz
•
Professional Development
10 questions
How to Email your Teacher

Quiz
•
Professional Development
15 questions
Fun Random Trivia

Quiz
•
Professional Development
22 questions
Anne Bradstreet 1612-1672

Quiz
•
Professional Development
18 questions
Spanish Speaking Countries and Capitals

Quiz
•
KG - Professional Dev...
14 questions
Fall Trivia

Quiz
•
11th Grade - Professi...
15 questions
Disney Characters Quiz

Quiz
•
Professional Development
15 questions
Quiz to Highlight Q types & other great features in Wayground

Quiz
•
Professional Development