␡
- Practice Questions
- Quick-Check Answer Key
- Answers and Explanations
This chapter is from the book
Quick-Check Answer Key
Objective 4.1: Conduct risk assessments and implement risk mitigation.
1. |
C |
2. |
B |
3. |
C |
4. |
D |
5. |
A |
6. |
D |
7. |
A |
8. |
B |
9. |
A |
10. |
C |
11. |
C |
12. |
A, B, D |
13. |
D |
14. |
B |
15. |
C |
Objective 4.2: Carry out vulnerability assessments using common tools.
1. |
A |
2. |
D |
3. |
C |
4. |
B |
5. |
D |
6. |
A |
7. |
A |
8. |
C |
9. |
D |
10. |
B |
11. |
C |
12. |
A |
13. |
D |
14. |
B |
15. |
C |
Objective 4.3: Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning.
1. |
B |
2. |
A, C |
3. |
B, C |
4. |
D |
5. |
A |
Objective 4.4: Use monitoring tools on systems and networks and detect security-related anomalies.
1. |
D |
2. |
A |
3. |
C |
4. |
B |
5. |
B |
6. |
D |
7. |
C |
8. |
A |
9. |
A |
10. |
B |
11. |
A |
12. |
C |
13. |
D |
14. |
C |
15. |
B |
16. |
A |
17. |
A |
18. |
B |
19. |
D |
20. |
C |
21. |
D |
22. |
A |
23. |
C |
24. |
B |
25. |
B, D |
Objective 4.5: Compare and contrast various types of monitoring methodologies.
1. |
B |
2. |
D |
3. |
C |
4. |
B |
5. |
D |
6. |
A |
7. |
A |
8. |
D |
9. |
B |
10. |
B |
11. |
A |
12. |
B |
13. |
D |
14. |
B, C |
15. |
A, D |
16. |
A, C |
17. |
B, D |
18. |
B |
19. |
A, B |
20. |
C, D |
Objective 4.6: Execute proper logging procedures and evaluate the results.
1. |
B |
2. |
A |
3. |
B |
4. |
C |
5. |
D |
6. |
C |
7. |
A |
8. |
C, D |
9. |
A |
10. |
A, B, D |
11. |
D |
12. |
B |
13. |
D |
14. |
B, C |
15. |
B |
16. |
C |
17. |
C, D |
18. |
B, C |
19. |
A, C, D |
20. |
B |
Objective 4.7: Conduct periodic audits of system security settings.
1. |
C |
2. |
A, B |
3. |
C |
4. |
D |
5. |
B, C |
6. |
C |
7. |
B |
8. |
D |
9. |
A, C |
10. |
D |
11. |
A |
12. |
B, D |
13. |
B |
14. |
B |
15. |
A |
16. |
B |
17. |
C |
18. |
A |
19. |
D |
20. |
C |