100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CompTIA Cybersecurity Analyst (CySA+) - Module 2: Vulnerability Management

Rating
-
Sold
-
Pages
11
Grade
A+
Uploaded on
21-04-2023
Written in
2022/2023

CompTIA Cybersecurity Analyst (CySA+) - Module 2: Vulnerability Management Document Content and Description Below CompTIA Cybersecurity Analyst (CySA+) - Module 2: Vulnerability Management All parts of a security policy should be public knowledge. True False -Answer- False What reasons might a company forgo scanning a critical system? Too much time Confidentiality Backups already exist Costs too much -Answer- Too much time & Costs too much What is the factor that determines scanning frequency characterized by an accepted amount of risk? Technical Constraints Risk Acceptance Risk Appetite Regulatory Requirements -Answer- Risk Appetite An assessment scan is used to discover assets. True False -Answer- False What type of test gives the best perspective of an outsider threat? Non-Credentialed Scan Passive Scan Agent-Based Scan Credentialed Scan -Answer- Non-Credentialed Scan What should be considered when prioritizing vulnerabilities to be fixed? Where it is How critical it is Time to fix Which scanner was used -Answer- How critical it is & Time to fix What is a factor considered when categorizing a change to a system? ScopeSize Sensitivity Level Risk -Answer- Risk What could inhibit a change from being implemented? Cost Complexity Approval All of the Above -Answer- All of the Above An Agent-Based Scan has a lesser impact on a network vs Sever-based. True False -Answer- True Which scan effects network traffic the least? Non-Credentialed Scan Agent-Based Scan Passive Scan Server-Based Scan -Answer- Passive Scan Which one of these is legally binding? MOU SLA ATWA MTTR -Answer- SLA What determines when a companies security capabilities should grow. Workflow Regulatory Requirements Technical Constraints Risk Appetite -Answer- Workflow Which type of scan uses a copy of the network traffic to find vulnerabilities? Agent-Based Scan Non-Credentialed Scan Passive Scan Server-Based Scan -Answer- Passive Scan The results of vulnerability scans should be shared with the entire company in order to fix vulnerabilities.True False -Answer- True What is it called when a scan misses an existing vulnerability? False Reporting True Negative False Negative False Positive -Answer- False Negative Which has a higher chance of being compromised? Agent-Based Scan SCAP Passive Scan Server-Based Scan -Answer- Agent-Based Scan Which type of scan is most likely to cause major disruption in everyday operations? Agent-Based Scan Non-Credentialed Scan Server-Based Scan Credentialed Scan -Answer- Credentialed Scan What factors help determine the potential frequency of scanning? Technical Constraints Vulnerability Feed Workflow Scope -Answer- Technical Constraints & Workflow After a successful scan it is best to continue running them over time. True False -Answer- True When running a vulnerability scan what determines the number of systems are part of it? Sensitivity Level Technical Constraints Scope SCAP -Answer- Scope What is making sure that a vulnerability scanner is kept up-to-date?Regulatory Requirements Vulnerability Feed SCAP Change Control -Answer- Vulnerability Feed A security policy stays relatively static throughout a companies history. True False -Answer- False What is a projected acceptable amount of downtime that is allowed that can determine if a change can be implemented? Regulatory Requirements MTTR Risk Appetite Availability -Answer- Availability What allows scanners to determine if a system meets a configuration baseline if that scanner is compatible? SCAP SLA Sandboxing CVSS -Answer- SCAP What uses a list of known weaknesses to determine if a system meets certain baseline? CVSS CWE SJW CVE -Answer- CWE & CVE Having multiple scanners does not decrease the likelihood of false negatives. True False -Answer- False What determines how far a vulnerability scan will examine? Vulnerability Feed Sensitivity Level Scope Depth -Answer- Sensitivity LevelRegulatory requirements could prevent a company from increasing it's risk appetite. True False -Answer- True Which scan gives the most information about a system? Passive Scan Non-Credentialed Scan Credentialed Scan Server-Based Scan -Answer- Credentialed Scan What determines how frequently a certain type of scan will run? Sensitivity Level Time Management Vulnerability Feed Scope -Answer- Scope A companies security policy doesn't need to change for different countries if it is compliant within it's own. True False -Answer- False What is the average amount of time that it takes to correct an issue? Availability MOU MTTR Downti

Show more Read less
Institution
CompTIA Cybersecurity Analyst
Course
CompTIA Cybersecurity Analyst









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CompTIA Cybersecurity Analyst
Course
CompTIA Cybersecurity Analyst

Document information

Uploaded on
April 21, 2023
Number of pages
11
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Savior NCSU
View profile
Follow You need to be logged in order to follow users or courses
Sold
95
Member since
2 year
Number of followers
70
Documents
3432
Last sold
1 week ago

3.5

25 reviews

5
9
4
7
3
3
2
0
1
6

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions