Technical Certification 0% 194 Technical Certification Program NameCompany NameEmailPhone Number 1 / 35 Category: Dark Web 1. Can you set up dark web monitoring to review more than one domain? Yes No 2 / 35 Category: External IP Vulnerability Scan 2. How do you create an external IP vulnerability scan? Go to Vulnerability Scan > Schedule a Scan > Click Create > select internal > IP or IP Range Go to Vulnerability Scan > Schedule a Scan > Click Create > select External > IP or IP Range 3 / 35 Category: Dark Web 3. How often does CYRISMA perform a data point check when you setup a dark web monitor? At first, CYRISMA will go back 1 year and then recheck for new data points every 48hrs At first, CYRISMA will go back 1 year and then recheck for new data points every 24hrs 4 / 35 Category: Dark Web 4. What areas of the dark web do we review to discover important information? CYRISMA searches for known data points within the dark web arena (breach data, forums, marketplaces, and or ransomware) CYRISMA searches for known data points within the dark web arena (forums, marketplaces, and or ransomware) 5 / 35 Category: Data Sensitivity Scanning 5. How many extension types can CYRISMA open to identify sensitive data? 145 150 6 / 35 Category: Instance Creation 6. How do you create a new instance for your client in the MSP Interface? Go to Admin > Create an Instance Go to Instance > New Instance 7 / 35 Category: Compliance 7. How do you setup an AD Monitor In the main menu of the instance you go to Compliance > Setup Secure Connection In the main menu of the instance you go to Compliance > Setup AD Monitor 8 / 35 Category: External Web App Vulnerability Scan 8. How do you mitigate identified web app flaws? You provide information to web developers to mitigate the discovered flaws in the web app code You provide information to web developers to mitigate the discovered flaws in the OS 9 / 35 Category: Instance Creation 9. How do you access the instance you created in the MSP Interface? Click on the button called "go to instance" Go to the URL of the instance 10 / 35 Category: External Web App Vulnerability Scan 10. How many External Web app's can you configure for a single scan setup? 1 5 11 / 35 Category: Mitigation 11. What is a mitigation plan? A plan that assigns accountability of identified risks It's a function to help you monitor risks 12 / 35 Category: Secure Baseline 12. Secure configuration allows you to securely configure what? Routers, Switches, and or Printers OS based systems such as Windows, Linux, and Mac 13 / 35 Category: Sensor based 13. Can you scan remote machines from a sensor? No Yes 14 / 35 Category: Setting up the Agent 14. How do you provision agents so they can download their intelligence and check in? The agent will check-in by itself You will need to go to Admin > Scan Agents > New Agent 15 / 35 Category: Data Sensitivity Scanning 15. What are the common elements that CYRISMA Scans for when looking for sensitive data? First name, last name, telephone numbers, passwords, and bank accounts Social security numbers, credit cards, drivers licenses, passwords, and bank accounts etc. 16 / 35 Category: Generate Overall Risk Assessment Report 16. When can the Cyber Risk Assessment report be created? You can only generate once you have completed the required elements You can generate the report anytime 17 / 35 Category: Internal Authenticated Vulnerability scan 17. What is the best way to scan all machines at the same time for an authenticated vulnerability scan? Select the option called Scan_all_systems to scan agent based machines Select the option called Agent_Group to scan agent based machines 18 / 35 Category: Compliance 18. How do you make sure that you're able to see your Microsoft Secure Score Status within CYRISMA? You setup Microsoft Secure Score to use your global admin account to access Office 365 You need to make sure that you have the Office 365 Connector enabled within the CYRISMA platform 19 / 35 Category: Compliance 19. Microsoft Secure Score is used for on-prem Microsoft Configurations No Yes 20 / 35 Category: External IP Vulnerability Scan 20. How do you enter in the format for the External IP's that you want to scan? Like this 1.1.1.1, 2.2.2.2 or 1.1.1.1/29 or 1.1.1.1-1.1.10 Like this 1.1.1.1:2,2,2,2 or 1.1.1.1 255.255.255.248 or 1.1.1.1 to 1.1.1.10 21 / 35 Category: Sensor based 21. When the agent is a sensor, how do you import targets to scan remotely from the sensor? Perform a Network Discovery and any discovered Target can be imported You are not allowed 22 / 35 Category: Mitigation 22. What types of mitigation plans can you create? You can create mitigation plans for data sensitivity, vulnerability, secure baseline scans, and dark web mitigation plans You can create mitigation plans for data sensitivity, vulnerability and secure baseline scans 23 / 35 Category: Generate Overall Risk Assessment Report 23. How do I generate the Cyber Risk Assessment report and presentation? Go to Admin > Cyber Risk Assessment Go to Compliance > Cyber Risk Assessment 24 / 35 Category: External Web App Vulnerability Scan 24. What type of results do you get with an External Web App Scan? Vulnerabilities such as service issues and or OS miss configurations Information such as SQL Injection, XSS and other type of web application Flaws 25 / 35 Category: Sensor based 25. The agent will need to have what type of account to scan a remote OS based machine An account with some sort of administrative privileges A regular user account 26 / 35 Category: Compliance 26. Active Directory Monitoring provides you with what type of information? AD monitor provides you detailed information on whether your Active Directory is installed correctly, and it's replication status AD monitor provides you detailed information about Users, Computers, and Security groups etc. 27 / 35 Category: Internal Authenticated Vulnerability scan 27. Can you select the option to get a vulnerability report once a scan has finished? no yes 28 / 35 Category: Generate Overall Risk Assessment Report 28. The Cyber Risk Assessment Report can just be downloaded? Yes - it can be downloaded via the platform and via email No - It can be scheduled to send it to you via email 29 / 35 Category: Agent based 29. What options does an Agent-based scan give you? To perform a data sensitivity, vulnerability, and a secure baseline scan locally and if needed a remote scan To perform just a vulnerability and data sensitivity scan 30 / 35 Category: Secure Baseline 30. How do you identify configuration drift? The ability to monitor the configuration of systems that have been securely configured It is the drift of the computers clock 31 / 35 Category: Setting up the Agent 31. Is it required to whitelist the CYRISMA Agent within your End Point protection? No Yes 32 / 35 Category: Mitigation 32. Can anyone create a master mitigation plan? No Yes 33 / 35 Category: Agent based 33. What is the benefit of Agent-based scanning over that of Sensor-based scanning? Your need to provide the agent administrative credentials You do not have to provide the agent any type of credentials to scan 34 / 35 Category: Setting up the Agent 34. What is the way best to deploy CYRISMA Agent to many machines at once? Pushing it via email to the user Via scripts outlined in the CYRISMA knowledgebase under agents 35 / 35 Category: Data Sensitivity Scanning 35. Where can CYRISMA scan for sensitive data? You can scan local drives, Office 365 cloud services, and Google Workspace You can scan local drives, UNC SMB/CIFS shares, Office 365 cloud services, and Google Workspace Your score is The average score is 82% LinkedIn Facebook Twitter VKontakte 0% Restart quiz