C795 CYBERSECURITY MANAGEMENT
II – TACTICAL. EXAM QUESTIONS AND
ANSWERS. VERIFIED 2025/2026.
As an IT security professional, you have just been hired by a multisite automotive dealership to
protect and manage its computer network. What is your first task in establishing a secure
defense system for the company?This task contains the radio buttons and checkboxes for
options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
Hire a system security vendor.
B
Perform a full vulnerability assessment.
C
Perform an asset inventory and classification audit.
D
Document all users on the corporate domain. - ANS Answer C is correct.
A security administrator has to have a complete inventory of systems and equipment connected
to the corporate network. Once this information is complete and accurate, a security
professional can begin mapping vulnerabilities to the known systems.
1 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.
,Which characteristic most accurately describes a zero-day exploit vulnerability?This task
contains the radio buttons and checkboxes for options. The shortcut keys to perform this task
are A to H and alt+1 to alt+9.
A
It is only known to hackers and a few security professionals.
B
It is only known to the hacker.
C
It was a major concern in the late 1990s, but current technology has eliminated them.
D
It is widely known, but ineffective and only used occasionally. - ANS Explanation: Answer B is
correct.
A zero-day exploit is a flaw in an operating system or program code that is discovered by a
threat actor with the intention of exploiting the vulnerability before authors of the code can
patch or rewrite the code to eliminate the vulnerability.
CVE - ANS MITRE Corporation
National Vulnerability Database (NVD) - ANS National Institute of Standards and Technology's
(NIST) Computer Security Division, these days the NVD is brought to you by your friends at the
Department of Homeland Security's National Cybersecurity Division. According to them
Which organizations provide vulnerability-mapping services, tools, or resources that can be
accessed for free?This task contains the radio buttons and checkboxes for options. The shortcut
keys to perform this task are A to H and alt+1 to alt+9.
2 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.
, A
AARP
B
OWASP
C
NIST
D
ACLU
E
MITRE - ANS Explanation: Answers B, C, and E are correct.
The Open Web Application Security Project (OWASP), National Institute of Standards and
Technology (NIST), and MITRE Corporation all provide free vulnerability-mapping services, tools,
or resources.
One of the main purposes of a cybersecurity professional is to help a company establish its
security requirements. Which critical components of an application risk assessment accomplish
this objective? Select all that apply.This task contains the radio buttons and checkboxes for
options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
Understanding the application type
B
Determining the users
3 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.
II – TACTICAL. EXAM QUESTIONS AND
ANSWERS. VERIFIED 2025/2026.
As an IT security professional, you have just been hired by a multisite automotive dealership to
protect and manage its computer network. What is your first task in establishing a secure
defense system for the company?This task contains the radio buttons and checkboxes for
options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
Hire a system security vendor.
B
Perform a full vulnerability assessment.
C
Perform an asset inventory and classification audit.
D
Document all users on the corporate domain. - ANS Answer C is correct.
A security administrator has to have a complete inventory of systems and equipment connected
to the corporate network. Once this information is complete and accurate, a security
professional can begin mapping vulnerabilities to the known systems.
1 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.
,Which characteristic most accurately describes a zero-day exploit vulnerability?This task
contains the radio buttons and checkboxes for options. The shortcut keys to perform this task
are A to H and alt+1 to alt+9.
A
It is only known to hackers and a few security professionals.
B
It is only known to the hacker.
C
It was a major concern in the late 1990s, but current technology has eliminated them.
D
It is widely known, but ineffective and only used occasionally. - ANS Explanation: Answer B is
correct.
A zero-day exploit is a flaw in an operating system or program code that is discovered by a
threat actor with the intention of exploiting the vulnerability before authors of the code can
patch or rewrite the code to eliminate the vulnerability.
CVE - ANS MITRE Corporation
National Vulnerability Database (NVD) - ANS National Institute of Standards and Technology's
(NIST) Computer Security Division, these days the NVD is brought to you by your friends at the
Department of Homeland Security's National Cybersecurity Division. According to them
Which organizations provide vulnerability-mapping services, tools, or resources that can be
accessed for free?This task contains the radio buttons and checkboxes for options. The shortcut
keys to perform this task are A to H and alt+1 to alt+9.
2 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.
, A
AARP
B
OWASP
C
NIST
D
ACLU
E
MITRE - ANS Explanation: Answers B, C, and E are correct.
The Open Web Application Security Project (OWASP), National Institute of Standards and
Technology (NIST), and MITRE Corporation all provide free vulnerability-mapping services, tools,
or resources.
One of the main purposes of a cybersecurity professional is to help a company establish its
security requirements. Which critical components of an application risk assessment accomplish
this objective? Select all that apply.This task contains the radio buttons and checkboxes for
options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
Understanding the application type
B
Determining the users
3 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.