CompTIA Cybersecurity Analyst (CySA+) - Module 2: Vulnerability Management Questions And Answers
CompTIA Cybersecurity Analyst (CySA+) - Module 2: Vulnerability Management All parts of a security policy should be public knowledge. True False - False What reasons might a company forgo scanning a critical system? Too much time Confidentiality Backups already exist Costs too much - Too much time & Costs too much What is the factor that determines scanning frequency characterized by an accepted amount of risk? Technical Constraints Risk Acceptance Risk Appetite Regulatory Requirements - Risk Appetite An assessment scan is used to discover assets. True False - False What type of test gives the best perspective of an outsider threat? Non-Credentialed Scan Passive Scan Agent-Based Scan Credentialed Scan - Non-Credentialed Scan What should be considered when prioritizing vulnerabilities to be fixed? Where it is How critical it is Time to fix Which scanner was used - How critical it is & Time to fix What is a factor considered when categorizing a change to a system? Scope Size Sensitivity Level Risk - Risk What could inhibit a change from being implemented? Cost Complexity Approval All of the Above - All of the Above An Agent-Based Scan has a lesser impact on a network vs Sever-based. True False - True Which scan effects network traffic the least? Non-Credentialed Scan Agent-Based Scan Passive Scan Server-Based Scan - Passive Scan Which one of these is legally binding? MOU SLA ATWA MTTR - SLA What determines when a companies security capabilities should grow. Workflow Regulatory Requirements Technical Constraints Risk Appetite - Workflow Which type of scan uses a copy of the network traffic to find vulnerabilities? Agent-Based Scan Non-Credentialed Scan Passive Scan Server-Based Scan - Passive Scan
Geschreven voor
- Instelling
- CompTIA
- Vak
- CompTIA
Documentinformatie
- Geüpload op
- 16 december 2022
- Aantal pagina's
- 11
- Geschreven in
- 2022/2023
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
comptia cybersecurity analyst cysa module 2 vulnerability management questions and answers
-
all parts of a security policy should be public knowledge
-
what reasons might a company forgo scanning