Bookmark this page

Quiz: Managing Security and Risk

Managing Security and Risk

Choose the correct answers to the following questions:


  1. 1.

    During which security management lifecycle stage do you adapt, revise, update, and remediate systems as the security landscape changes?

    A

    Build

    B

    Run

    C

    Manage

    D

    Adapt

    E

    Design

  2. 2.

    To send a report of any suspected security vulnerability in a Red Hat product or service to the Red Hat Product Security team, which email address do you use?

    A

    rhsecure@redhat.com

    B

    security@redhat.com

    C

    rhtraining@redhat.com

    D

    secalert@redhat.com

  3. 3.

    Which three statements describe a Critical impact severity classification? (Choose three.)

    A

    Requires an authenticated remote user.

    B

    Does not require user interaction to invoke a possible system compromise by arbitrary code execution.

    C

    Exposes a vulnerability that worms can exploit.

    D

    Requires a local user.

    E

    Is easily exploited by an unauthenticated attacker.

  4. 4.

    Red Hat uses which numbering and naming standard to consistently report and track security-related software issues?

    A

    Customized email notifications from the rhsecurity@redhat.com bug-tracking team

    B

    Common Vulnerabilities and Exposures (CVE)

    C

    Common Vulnerability Scoring System (CVSS)

    D

    Red Hat Security Vulnerability Response (RHSVR)

Revision: rh415-9.2-a821299