100% Free Exams (No login or credit card required)

Section 4.3

Demonstrate your acquired knowledge about explaining various activities associated with vulnerability
management. This will demonstrate your proficiency for section 4.3 of the Security+ SY0-701 objectives.

1 / 25

Summarizing findings and next steps is known as:

2 / 25

An independent check that patches succeeded is a:

3 / 25

Confirming fixes by re-running scans is called:

4 / 25

Skipping a patch under formal approval creates an:

5 / 25

Controls used when patching is impossible are:

6 / 25

Using VLANs to limit vulnerable system access is:

7 / 25

Quickly applying vendor fixes is known as:

8 / 25

A company’s willingness to accept risk is called:

9 / 25

Considering asset value and exploitability defines:

10 / 25

A unique identifier for a known flaw is:

11 / 25

A standard numeric severity rating is:

12 / 25

Ranking vulnerabilities by business impact is:

13 / 25

Missing a real vulnerability in a scan is a:

14 / 25

A scan flagging a harmless open port is a:

15 / 25

Reviewing configuration and processes is part of:

16 / 25

A public program rewarding bug reports is a:

17 / 25

Ethical attack simulations are known as:

18 / 25

Monitoring hacker forums for leaked exploits refers to:

19 / 25

Membership in an ISAC provides:

20 / 25

Paying for curated threat indicators comes from a:

21 / 25

Gathering publicly available cyber-threat data is:

22 / 25

Watching third-party libraries for new bugs is known as:

23 / 25

Running an app and observing its behavior identifies flaws via:

24 / 25

Reviewing source code without running it is called:

25 / 25

Which tool passively inspects traffic for known weaknesses?

Your score is

The average score is 0%

0%