Question 6 of 132

In regard to the Security Operations Process, which of the following statements defines the “Identify” phase?

Answer

Suggested Answer

The suggested answer is A.

The 'Identify' phase in the Security Operations Process is about recognizing what processes and assets need protection. Identifying critical assets, understanding the business context, and determining the risk associated with those assets are key activities of this phase.

Community Votes5 votes
ASuggested
100%
Question 7 of 132

Which module is used to adjust the frequency in which CVEs are updated?

Answer

Suggested Answer

The suggested answer is A.

The correct module used to adjust the frequency at which CVEs (Common Vulnerabilities and Exposures) are updated is the NVD Auto-update. This module allows for automated updates of CVE information from the National Vulnerability Database, ensuring that vulnerability data remains current and accurate.

Community Votes4 votes
ASuggested
100%
Question 8 of 132

A list of software weaknesses is known as:

Answer

Suggested Answer

The suggested answer is D.

Question 9 of 132

Vulnerability Response can be BEST categorized as a ____________, focused on identifying and remediating vulnerabilities as early as possible.

Answer

Suggested Answer

The suggested answer is A.

Question 10 of 132

If a customer expects to ingest 2 million vulnerabilities during its initial load, which instance size should you recommend?

Answer

Suggested Answer

The suggested answer is C.

If a customer expects to ingest 2 million vulnerabilities during its initial load, the recommended instance size should be XXL. This is because an instance size XL is suitable for less than 1 million vulnerabilities, while an instance size Ultra is recommended for over 2.5 million vulnerabilities. XXL fits the requirement for ingesting 1 to 2.5 million vulnerabilities.

Community Votes3 votes
CSuggested
100%