Home
31.
What federal law requires the use of vulnerability scanning on information systems operated by federal government agencies?
  • A.
    HIPAA
  • B.
    GLBA
  • C.
    FISMA
  • D.
    FERPA
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
The Federal Information Security Management Act (FISMA) requires that federal agencies implement vulnerability management programs for federal information systems.
Report
Name Email  
32.
Gary is the system administrator for a federal agency and is responsible for a variety of information systems. Which systems must be covered by vulnerability scanning programs?
  • A.
    Only high-impact systems
  • B.
    Only systems containing classified information
  • C.
    High- or moderate-impact systems
  • D.
    High-, moderate-, or low-impact systems
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
The Federal Information Security Management Act (FISMA) requires vulnerability management programs for all federal information systems, regardless of their assigned impact rating.
Report
Name Email  
33.
What tool can administrators use to help identify the systems present on a network prior to conducting vulnerability scans?
  • A.
    Asset inventory
  • B.
    Web application assessment
  • C.
    Router
  • D.
    DLP
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
An asset inventory supplements automated tools with other information to detect systems present on a network. The asset inventory provides critical information for vulnerability scans.
Report
Name Email  
34.
Tonya is configuring vulnerability scans for a system that is subject to the PCI DSS compliance standard. What is the minimum frequency with which she must conduct scans?
  • A.
    Daily
  • B.
    Weekly
  • C.
    Monthly
  • D.
    Quarterly
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
PCI DSS requires that organizations conduct vulnerability scans on at least a quarterly basis, although many organizations choose to conduct scans on a much more frequent basis.
Report
Name Email  
35.
Which one of the following is not an example of a vulnerability scanning tool?
  • A.
    QualysGuard
  • B.
    Snort
  • C.
    Nessus
  • D.
    OpenVAS
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
QualysGuard, Nessus, and OpenVAS are all examples of vulnerability scanning tools. Snort is an intrusion detection system.
Report
Name Email