31.
What federal law requires the use of vulnerability scanning
on information systems operated by federal government
agencies?
- A.HIPAA
- B.GLBA
- C.FISMA
- D.FERPA
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
The Federal Information Security Management Act (FISMA) requires that federal agencies implement vulnerability management programs for federal information systems. |
32.
Gary is the system administrator for a federal agency and is
responsible for a variety of information systems. Which
systems must be covered by vulnerability scanning programs?
- A.Only high-impact systems
- B.Only systems containing classified information
- C.High- or moderate-impact systems
- D.High-, moderate-, or low-impact systems
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
The Federal Information Security Management Act (FISMA) requires vulnerability management programs for all federal information systems, regardless of their assigned impact rating. |
33.
What tool can administrators use to help identify the systems
present on a network prior to conducting vulnerability scans?
- A.Asset inventory
- B.Web application assessment
- C.Router
- D.DLP
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
An asset inventory supplements automated tools with other information to detect systems present on a network. The asset inventory provides critical information for vulnerability scans. |
34.
Tonya is configuring vulnerability scans for a system that is
subject to the PCI DSS compliance standard. What is the
minimum frequency with which she must conduct scans?
- A.Daily
- B.Weekly
- C.Monthly
- D.Quarterly
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
PCI DSS requires that organizations conduct vulnerability scans on at least a quarterly basis, although many organizations choose to conduct scans on a much more frequent basis. |
35.
Which one of the following is not an example of a
vulnerability scanning tool?
- A.QualysGuard
- B.Snort
- C.Nessus
- D.OpenVAS
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
QualysGuard, Nessus, and OpenVAS are all examples of vulnerability scanning tools. Snort is an intrusion detection system. |