Sales Certification 0% 106 Sales Certification Program NameCompany NameEmailPhone Number 1 / 31 Category: Sales - Sensitive Data Discovery 1. With CYRISMA Sensitive Data Discovery capability, you can discover sensitive data in which environments? Cloud, on-prem and middleware Cloud & on-prem 2 / 31 Category: Dark Web 2. Can you set up dark web monitoring to review more than one domain? No Yes 3 / 31 Category: Sales - Overall Risk Dashboard 3. How is the Ransomware Recovery Cost derived? Calculated based on the number of machines and employees affected, and downtime costs Calculated based on the number of machines and employees affected, downtime costs, and sensitive data value 4 / 31 Category: Sales - Risk Mitigation 4. The Mitigation Dashboard provides users with a quick view of what? All plans versus closed plans, distribution of mitigation plans across scan categories (Data Sensitivity, Secure Baseline Vulnerability), and open plans versus plans that are overdue All plans versus closed plans, distribution of mitigation plans across scan categories (Data Sensitivity, Secure Baseline, Dark Web, Vulnerability), and open plans versus plans that are overdue 5 / 31 Category: Sales - Overall Risk Dashboard 5. What information is provided to an organization regarding their monetization of risk? Sensitive Data Dark Web Value, Ransomware Recovery Costs, Breach Notification Costs, and Residual Risk Costs Sensitive Data Dark Web Value, Ransomware Recovery Costs, and Breach Notification Costs 6 / 31 Category: Sales - Overall Risk Dashboard 6. What is the benefit of CYRISMA's Residual Risk Adjustment feature? Allows the ability for users to put security controls in place at no additional charge for such solutions. Allows the ability for users to put security controls in place. 7 / 31 Category: Sales - Secure Baseline Scans 7. Can you compare configuration settings against CIS or DISA (STIG) Benchmarks? No Yes 8 / 31 Category: Sales - Secure Baseline Scans 8. What is the purpose of the Secure Baseline Trend Chart? See the performance in secure configuration over time See the performance in secure configuration and policy management over time 9 / 31 Category: Sales - Dark Web Monitoring 9. Can CYRISMA's dark web capability provide you with a description of ransomware discussions of your org? Yes No 10 / 31 Category: Sales - Overall Risk Dashboard 10. How is the vulnerability management risk grade calculated? Vulnerability management grades are based on internal authenticated, internal unauthenticated, External, and Web App vulnerability scans across your orgs on-prem computing environment Vulnerability management grades are based on internal authenticated, internal unauthenticated, External, and Web App vulnerability scans across your orgs computing environment (on-prem & cloud) 11 / 31 Category: Sales - Vulnerability Management 11. CYRISMA Root Cause Analysis gives users the ability to view what? Root causes of CVE's in the environment Root causes of CVE's in the environment and the systems affected by each 12 / 31 Category: Sales - Vulnerability Management 12. What reports types are available for download when producing a vulnerability scan report? Snapshot, Full, Specific and Executive Full, Specific and Executive 13 / 31 Category: Sales - Overall Risk Dashboard 13. The Risk Trend graph gives users the ability to view the performance of which categories over a selected period of time? Sensitivity, Vulnerability and Baseline Sensitivity, Vulnerability, Baseline and Dark Web 14 / 31 Category: Sales - Overall Risk Dashboard 14. How is the overall risk grade calculated? Based on current & previous performance grades on vulnerability, sensitive data and secure baseline on company laptops, desktops or servers Based on current & previous performance grades on vulnerability and sensitive data on company laptops, desktops or servers 15 / 31 Category: Sales - Dark Web Monitoring 15. Can CYRISMA's dark web capability provide you a translation feature to translate discussions? Yes No 16 / 31 Category: Sales - Secure Baseline Scans 16. What is the purpose of CYRISMA's Secure Baseline capability? You can compare your Operating System's existing configuration against established frameworks, find security gaps and misconfigurations You can compare your Operating System's existing configuration against established frameworks, find security gaps, misconfigurations and strengthen your configuration based on scan results 17 / 31 Category: Dark Web 17. How often does CYRISMA perform a data point check when you setup a dark web monitor? At first, CYRISMA will go back 1 year and then recheck for new data points every 48hrs At first, CYRISMA will go back 1 year and then recheck for new data points every 24hrs 18 / 31 Category: Sales - Overall Risk Dashboard 18. What ability does the NIST CSF Compliance Tracking Checklist provide to the customer? Ability to map your existing security processes against current requirements Ability to map your existing security processes against current requirements and which one that may need attention 19 / 31 Category: Sales - Vulnerability Management 19. What is the purpose of the CYRISMA Vulnerability Management capability? Find vulnerabilities, understand their root cause, prioritize remediation, compare scan results over time and create easy-to track mitigation plans Find vulnerabilities, understand their root cause, compare scan results over time and create easy-to track mitigation plans 20 / 31 Category: Sales - Vulnerability Management 20. Does CYRISMA provide a summary of all vulnerabilities in the Network, their risk levels, targets affected, and CVE links only? No Yes 21 / 31 Category: Sales - Vulnerability Management 21. How many vulnerability profiles in your environment are displayed in the Vulnerability Scan Dashboard? 5 3 22 / 31 Category: Sales - Sensitive Data Discovery 22. The Data Category Tree Map Summary provides an overall category breakdown of what sensitive data was discovered during scans. But over what time period? Previous 100 Days Previous 365 Days 23 / 31 Category: Sales - Risk Mitigation 23. Does CYRISMA give users the ability to re-assign mitigation plans? No Yes 24 / 31 Category: Sales - Overall Risk Dashboard 24. What is the purpose of the CYRISMA compliance tracker? Ability to track your organizations compliance with regulatory and best practice frameworks Ability to track your organizations compliance with regulatory frameworks 25 / 31 Category: Sales - Overall Risk Dashboard 25. How is the Data Breach Notification Cost derived? Cost to notify current persons whose data was compromised due to a security incident. Covers investigation costs, fines, class action lawsuits corresponding with each sensitive data category Cost to notify persons (past & current) whose data was compromised due to a security incident. Covers investigation costs, fines, class action lawsuits corresponding with each sensitive data category 26 / 31 Category: Sales - Cyber Risk Assessment Reports 26. CYRISMA's Overall Risk Assessment Breakdown provides a holistic overview of what? Your overall scan status ( if completed or not yet completed) Your overall residual risk report in monetary terms 27 / 31 Category: Sales - Overall Risk Dashboard 27. As an overview, what information does the Assigned Mitigation Plans provide you? Who it's been assigned to and due date Who it's been assigned to, due date, and their progress 28 / 31 Category: Sales - Sensitive Data Discovery 28. What are the total of number of file types that CYRISMA's Sensitive Data Discovery capability can scan? 150 125 29 / 31 Category: Sales - Overall Risk Dashboard 29. The overall risk dashboard gives you access to what? The overall risk dashboard give you a quick overview of your org's current performance scan categories (Vulnerability, Security Baseline, Sensitive Data, Dark Web); risk monetization data; compliance status The overall risk dashboard give you a quick overview of your org's current performance scan categories (Vulnerability, Security Baseline, Sensitive Data, Dark Web); risk monetization data; compliance status; and risk mitigation efforts 30 / 31 Category: Sales - Sensitive Data Discovery 30. In the Data Category Tree Map Summary, clicking on a particular category it provides you with what information? Complete list of items found in that category during the scans and their exact location Complete list of items found in that category during the scans 31 / 31 Category: Dark Web 31. What areas of the dark web do we review to discover important information? CYRISMA searches for known data points within the dark web arena (breach data, forums, marketplaces, and or ransomware) CYRISMA searches for known data points within the dark web arena (forums, marketplaces, and or ransomware) Your score is The average score is 79% LinkedIn Facebook Twitter VKontakte 0% Restart quiz