Question 6 of 60
In regard to the Security Operations Process, which of the following statements defines the “Identify” phase?
    Correct Answer: A

    The 'Identify' phase in the Security Operations Process is about recognizing what processes and assets need protection. Identifying critical assets, understanding the business context, and determining the risk associated with those assets are key activities of this phase.

Question 7 of 60
Which module is used to adjust the frequency in which CVEs are updated?
    Correct Answer: A

    The correct module used to adjust the frequency at which CVEs (Common Vulnerabilities and Exposures) are updated is the NVD Auto-update. This module allows for automated updates of CVE information from the National Vulnerability Database, ensuring that vulnerability data remains current and accurate.

Question 8 of 60
A list of software weaknesses is known as:
    Correct Answer: D

Question 9 of 60
Vulnerability Response can be best categorized as a ____________, focused on identifying and remediating vulnerabilities as early as possible.
    Correct Answer: A

Question 10 of 60
If a customer expects to ingest 2 million vulnerabilities during its initial load, which instance size should you recommend?
    Correct Answer: C

    If a customer expects to ingest 2 million vulnerabilities during its initial load, the recommended instance size should be XXL. This is because an instance size XL is suitable for less than 1 million vulnerabilities, while an instance size Ultra is recommended for over 2.5 million vulnerabilities. XXL fits the requirement for ingesting 1 to 2.5 million vulnerabilities.