Management II - Tactical
Questions with Correct Answers |
Latest Update 100% Pass
As an IT security professional, you have just been hired by a multisite automotive
dealership to protect and manage its computer network. What is your first task in
establishing a secure defense system for the company?This task contains the radio
buttons and checkboxes for options. The shortcut keys to perform this task are A
to H and alt+1 to alt+9.
A
Hire a system security vendor.
B
Perform a full vulnerability assessment.
,C
Perform an asset inventory and classification audit.
D
Document all users on the corporate domain. - CORRECT ANSWER-Answer C
is correct.
A security administrator has to have a complete inventory of systems and
equipment connected to the corporate network. Once this information is complete
and accurate, a security professional can begin mapping vulnerabilities to the
known systems.
Which characteristic most accurately describes a zero-day exploit vulnerability?This
task contains the radio buttons and checkboxes for options. The shortcut keys to
perform this task are A to H and alt+1 to alt+9.
A
It is only known to hackers and a few security professionals.
B
COPYRIGHT ALL RIGHTS RESERVED ©️ 2025
,It is only known to the hacker.
C
It was a major concern in the late 1990s, but current technology has eliminated
them.
D
It is widely known, but ineffective and only used occasionally. - CORRECT
ANSWER-Explanation: Answer B is correct.
A zero-day exploit is a flaw in an operating system or program code that is
discovered by a threat actor with the intention of exploiting the vulnerability
before authors of the code can patch or rewrite the code to eliminate the
vulnerability.
CVE - CORRECT ANSWER-MITRE Corporation
National Vulnerability Database (NVD) - CORRECT ANSWER-National
Institute of Standards and Technology's (NIST) Computer Security Division, these
, days the NVD is brought to you by your friends at the Department of Homeland
Security's National Cybersecurity Division. According to them
Which organizations provide vulnerability-mapping services, tools, or resources
that can be accessed for free?This task contains the radio buttons and checkboxes
for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
AARP
B
OWASP
C
NIST
D
ACLU
E
COPYRIGHT ALL RIGHTS RESERVED ©️ 2025