Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4,6 TrustPilot
logo-home
Examen

CompTIA Cybersecurity Analyst (CySA+) - Module 2: Vulnerability Management

Note
-
Vendu
-
Pages
11
Grade
A+
Publié le
21-04-2023
Écrit en
2022/2023

CompTIA Cybersecurity Analyst (CySA+) - Module 2: Vulnerability Management Document Content and Description Below CompTIA Cybersecurity Analyst (CySA+) - Module 2: Vulnerability Management All parts of a security policy should be public knowledge. True False -Answer- False What reasons might a company forgo scanning a critical system? Too much time Confidentiality Backups already exist Costs too much -Answer- Too much time & Costs too much What is the factor that determines scanning frequency characterized by an accepted amount of risk? Technical Constraints Risk Acceptance Risk Appetite Regulatory Requirements -Answer- Risk Appetite An assessment scan is used to discover assets. True False -Answer- False What type of test gives the best perspective of an outsider threat? Non-Credentialed Scan Passive Scan Agent-Based Scan Credentialed Scan -Answer- Non-Credentialed Scan What should be considered when prioritizing vulnerabilities to be fixed? Where it is How critical it is Time to fix Which scanner was used -Answer- How critical it is & Time to fix What is a factor considered when categorizing a change to a system? ScopeSize Sensitivity Level Risk -Answer- Risk What could inhibit a change from being implemented? Cost Complexity Approval All of the Above -Answer- All of the Above An Agent-Based Scan has a lesser impact on a network vs Sever-based. True False -Answer- True Which scan effects network traffic the least? Non-Credentialed Scan Agent-Based Scan Passive Scan Server-Based Scan -Answer- Passive Scan Which one of these is legally binding? MOU SLA ATWA MTTR -Answer- SLA What determines when a companies security capabilities should grow. Workflow Regulatory Requirements Technical Constraints Risk Appetite -Answer- Workflow Which type of scan uses a copy of the network traffic to find vulnerabilities? Agent-Based Scan Non-Credentialed Scan Passive Scan Server-Based Scan -Answer- Passive Scan The results of vulnerability scans should be shared with the entire company in order to fix vulnerabilities.True False -Answer- True What is it called when a scan misses an existing vulnerability? False Reporting True Negative False Negative False Positive -Answer- False Negative Which has a higher chance of being compromised? Agent-Based Scan SCAP Passive Scan Server-Based Scan -Answer- Agent-Based Scan Which type of scan is most likely to cause major disruption in everyday operations? Agent-Based Scan Non-Credentialed Scan Server-Based Scan Credentialed Scan -Answer- Credentialed Scan What factors help determine the potential frequency of scanning? Technical Constraints Vulnerability Feed Workflow Scope -Answer- Technical Constraints & Workflow After a successful scan it is best to continue running them over time. True False -Answer- True When running a vulnerability scan what determines the number of systems are part of it? Sensitivity Level Technical Constraints Scope SCAP -Answer- Scope What is making sure that a vulnerability scanner is kept up-to-date?Regulatory Requirements Vulnerability Feed SCAP Change Control -Answer- Vulnerability Feed A security policy stays relatively static throughout a companies history. True False -Answer- False What is a projected acceptable amount of downtime that is allowed that can determine if a change can be implemented? Regulatory Requirements MTTR Risk Appetite Availability -Answer- Availability What allows scanners to determine if a system meets a configuration baseline if that scanner is compatible? SCAP SLA Sandboxing CVSS -Answer- SCAP What uses a list of known weaknesses to determine if a system meets certain baseline? CVSS CWE SJW CVE -Answer- CWE & CVE Having multiple scanners does not decrease the likelihood of false negatives. True False -Answer- False What determines how far a vulnerability scan will examine? Vulnerability Feed Sensitivity Level Scope Depth -Answer- Sensitivity LevelRegulatory requirements could prevent a company from increasing it's risk appetite. True False -Answer- True Which scan gives the most information about a system? Passive Scan Non-Credentialed Scan Credentialed Scan Server-Based Scan -Answer- Credentialed Scan What determines how frequently a certain type of scan will run? Sensitivity Level Time Management Vulnerability Feed Scope -Answer- Scope A companies security policy doesn't need to change for different countries if it is compliant within it's own. True False -Answer- False What is the average amount of time that it takes to correct an issue? Availability MOU MTTR Downti

Montrer plus Lire moins
Établissement
CompTIA Cybersecurity Analyst
Cours
CompTIA Cybersecurity Analyst









Oups ! Impossible de charger votre document. Réessayez ou contactez le support.

École, étude et sujet

Établissement
CompTIA Cybersecurity Analyst
Cours
CompTIA Cybersecurity Analyst

Infos sur le Document

Publié le
21 avril 2023
Nombre de pages
11
Écrit en
2022/2023
Type
Examen
Contient
Questions et réponses

Sujets

€7,83
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien

Faites connaissance avec le vendeur

Seller avatar
Les scores de réputation sont basés sur le nombre de documents qu'un vendeur a vendus contre paiement ainsi que sur les avis qu'il a reçu pour ces documents. Il y a trois niveaux: Bronze, Argent et Or. Plus la réputation est bonne, plus vous pouvez faire confiance sur la qualité du travail des vendeurs.
Savior NCSU
S'abonner Vous devez être connecté afin de suivre les étudiants ou les cours
Vendu
95
Membre depuis
2 année
Nombre de followers
70
Documents
3432
Dernière vente
1 semaine de cela

3,5

25 revues

5
9
4
7
3
3
2
0
1
6

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions