Question: uestion 1 ( Mandatory ) ( 1 point ) Saved Continuous Diagnosis and Mitigation ( CDM ) relates to Question 1 options: security incident response.
uestion Mandatory point
Saved
Continuous Diagnosis and Mitigation CDM relates to
Question options:
security incident response.
vulnerability management.
privacy provisioning.
checking USCERT advisory.
Question Mandatory point
National Vulnerability Database NVD lists
Question options:
all attacks on computer systems.
all exploits for vulnerabilities.
zeroday vulnerabilities.
all known vulnerabilities.
Question Mandatory point
Patch management tools
Question options:
do not necessarily correlate what they detect on your systems to known vulnerabilities.
correlate what they detect on your systems to known vulnerabilities.
are based on known vulnerabilities.
correlate what they detect on your systems to unknown vulnerabilities.
Question Mandatory point
Software assessment management SWAM is a capability
Question options:
to fix vulnerabilities in the software being used by an organization.
of checking if there are new vulnerabilities reported on NVD for the software being used by your organization.
patch management by automatically fixing vulnerabilities.
for replacing vulnerable software with alternatives.
Question Mandatory point
For vulnerability management the desired state of a software is
Question options:
that the software should be of a known version with known vulnerabilities.
that the software should be of an unknown version with known vulnerabilities.
that the software should be of a unknown version with unknown vulnerabilities.
that the software should be of a known version with unknown vulnerabilities.
Question Mandatory point
A typical way for a vulnerability scanner to identify vulnerabilities in your system is
Question options:
by checking for missing patches.
by installing a vulnerability recognition system.
by checking your system against its database of vulnerabilities.
by checking your system against national vulnerability database NVD
Question Mandatory point
A surface vulnerability is a weakness that
Question options:
is not dangerous.
corresponds to attack surface.
is related to other vulnerabilities.
is not related to other vulnerabilities.
Question Mandatory point
Like other pattern matching and signaturebased tools, vulnerability scanners have
Question options:
low false positive rates.
high false positive rates.
low false negative rates.
high false negative rates.
Question Mandatory point
Setting up the rules, getting management approval, documenting the approval and setting testing goals are
Question options:
the four phases of penetration testing.
vulnerability management steps.
patch management system.
the planning phase of penetration testing.
Question Mandatory point
This phase of the penetration testing occurs simultaneously with other three phases.
Question options:
the planning phase.
the discovery phase.
the attack phase.
the reporting phase.
Question Mandatory point
The activities during the vulnerability window should include
Question options:
things like penetration testing to discover vulnerabilities.
risk assessment, available patches, and read advisories about the vulnerability
reporting the vulnerability to USCERT and NVD
sending out your IT staff for training to learn more about the vulnerability found.
Question Mandatory point
User training, policy enforcement, and incident response are part of
Question options:
vulnerability assessment.
exploit discovery.
penetration testing.
countermeasures.
Question Mandatory point
CAIN, John the Ripper, Lphcrack, Ophcrack, Hashcat and Aircrackingng are
Question options:
password cracking tools.
vulnerability scanners.
penetration testing tools.
patch management tools.
Question Mandatory point
The rainbow crack tool is password cracking tool that works by
Question options:
brute force attack method.
dictionary attack method.
comparing the password hash with rainbow table hashes.
guess work.
Question Mandatory point
Use of CAPTCHA and recognition of images are protections against
Question options:
password cracking tools.
bot attacks.
vulnerabilities.
weak passwords.
Question Mandatory point
Authentication such as FA is a password attack countermeasure whose target is the
Question options:
adversary.
user.
admin.
vendor.
Question Mandatory point
Access control, consisting of authentication and authorization should be applied
Question options:
neither internally, not externally.
not internally, but externally.
internally but not externally.
internally and externally.
Question Mandatory point
Rulebased access control is the same thing as
Question options:
rolebased access control.
mandatory access control.
discretionary access control.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
