CySA+

CySA+

Professional Development

15 Qs

quiz-placeholder

Similar activities

Mobile and Operating Systems

Mobile and Operating Systems

Professional Development

20 Qs

PHP MySQL

PHP MySQL

7th Grade - Professional Development

17 Qs

Physical Security Controls

Physical Security Controls

Professional Development

10 Qs

GUESS THAT WORD IN CYBER!

GUESS THAT WORD IN CYBER!

Professional Development

10 Qs

Simulacro de examen final - Diciembre 2023

Simulacro de examen final - Diciembre 2023

Professional Development

20 Qs

Cloud Computing

Cloud Computing

Professional Development

10 Qs

FOSS FEST QUIZ

FOSS FEST QUIZ

Professional Development

10 Qs

Sec+ CH.2 Review Test

Sec+ CH.2 Review Test

Professional Development

15 Qs

CySA+

CySA+

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Connor Hach

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A healthcare company prioritizes maintaining the confidentiality of patient data within its systems. A security analyst must prioritize vulnerabilities for remediation based on the CVSS impact metrics for the system. Which of the following vulnerabilities should be given priority for remediation?

Vulnerability CVSS Impact Metrics

1 C:L/I:H/A:H

2 C:H/I:L/A:L

3 C:N/I:H/A:N

4 C:L/I:N/A:H


Vulnerability 1

Vulnerability 2

Vulnerability 3

Vulnerability 4

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A vulnerability is currently being exploited and requires no user interaction or elevated privileges. It significantly impacts integrity and availability but has no effect on confidentiality. Which of the following CVE metrics would best capture the characteristics of this vulnerability?


CVSS:/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

CVSS:/AV:P/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H

CVSS:/AV:A/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L

 CVSS:/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A vulnerability is currently being exploited, requiring no user interaction but demanding elevated privileges. It highly impacts integrity but has no impact availability. It also has a low impact on confidentiality. Which of the following CVE metrics would best capture the characteristics of this vulnerability?


 CVSS:/AV:P/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L

CVSS:/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS:/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:H

CVSS:/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:H/A :N


4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A vulnerability assessment has flagged a critical vulnerability in a web server. The security analyst needs to determine if the vulnerability is a false positive. The initial investigation reveals that the conditions required for the vulnerability to be exploited are not present on the server. What should the security analyst classify this vulnerability as?


True Positive

False Positive

True Negative

False Negative

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company uses a proprietary application critical to its operations. A recent vulnerability scan shows a medium-severity vulnerability in the application. However, the application's role in business operations significantly increases its value to the company. How should the security analyst prioritize this vulnerability?


Low priority

Medium priority

High priority

Ignore the vulnerability

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst is compiling a report to communicate the status of vulnerabilities discovered during the latest vulnerability scan. The report includes information about the vulnerabilities, affected hosts, and their associated risk scores. What aspect of vulnerability management reporting involves providing information about the vulnerabilities discovered, affected hosts, and their associated risk scores?

Compliance reports

Action plans

Metrics and KPI's

Vulnerability management reporting

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An organization is required to adhere to certain regulatory standards and frameworks. As part of compliance efforts, the security team generates reports detailing the organization's adherence to these standards. What type of reports are generated to demonstrate adherence to regulatory standards and frameworks?


Vulnerability management reporting

Compliance reports

Action plans

Metrics and KPI's

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?