Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
CompTIA CYSA
Quiz 6: Analyzing Vulnerability Scans and Identifying Common Vulnerabilities
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Question 1
Multiple Choice
Carl is a new cybersecurity analyst. His manager has just asked him to implement a vulnerability scanner that uses the CVSS. Which of the following best describes why he would want to use it?
Question 2
Multiple Choice
Simone, a cybersecurity researcher, has just finished the analysis and documentation of a new vulnerability she discovered in a widely used product. In addition to contacting the manufacturer of the software, she also believes it is necessary to make a plug-in available so common vulnerability scanners can pick up the vulnerability in their scans. Which of the following would be helpful for her to know in order to meet this goal?
Question 3
Multiple Choice
Piet is analyzing the report generated by a Nessus scan and sees two types of scores in the Risk Information section. One of the scores represents the intrinsic qualities of the vulnerability when it was first discovered. Which of the following scores represents these intrinsic qualities?
Question 4
Multiple Choice
Faranoush is examining the CVSS Base Score Exploitability Metrics to better understand the information she sees in her report. Which of the following reflects the ability of a vulnerability in one software component to impact other resources?
Question 5
Multiple Choice
Cosmo is reviewing a recent Nessus scan report and sees a number of items that have recently had compensating controls implemented for them. Which of the following terms might describe these items in the report?
Question 6
Multiple Choice
Phillida, a cybersecurity analyst, is comparing vulnerability scanning products for potential use in her organization. She reads that Nessus uses a combination of machine learning and threat intelligence to produce which of the following?
Question 7
Multiple Choice
Ramon, a cybersecurity analyst, is aware of the regulatory requirements that his organization must meet. He needs to make sure that best practices are meeting the goals of these regulatory requirements. Which of the following might he decide to employ as part of a vulnerability scan?
Question 8
Multiple Choice
Kallie, a cybersecurity analyst, has just returned from a cybersecurity conference where she learned about the Nessus vulnerability scanner. She wants to try it at her company, but her software budget has already been spent for the fiscal year. Which of the following versions should she consider installing?
Question 9
Multiple Choice
Alaa wants to update her Nessus installation to ensure that she is scanning for all recently discovered vulnerabilities. Which of the following does she need to download?
Question 10
Multiple Choice
Darien last ran a vulnerability scan a year ago. Which of the following could he expect to have changed if he ran the scan again today?
Question 11
Multiple Choice
Nephele is looking at the vulnerabilities found in her organization. She wants to figure out which ones must be present or addressed from the local network compared to the ones that must be addressed either from an adjacent network or other network. Which of the following metrics covers this information?
Question 12
Multiple Choice
Morwenna wants to install Nessus for a trial run on her company's infrastructure. Which of the following is the default method of installation?
Question 13
Multiple Choice
Dimitri wants to install Nessus on the systems within his network, but is concerned that Nessus may not be compatible with certain types of devices in his company. Which of the following is Nessus not compatible with?
Question 14
Multiple Choice
Valeria, a cybersecurity manager, wants to start using a vulnerability scanner at the large global organization where she works. Which of the following might be the best fit for this organization?