Technical Certification

0%
194

Technical Certification Program

1 / 35

Category: Dark Web

1. Can you set up dark web monitoring to review more than one domain?

2 / 35

Category: External IP Vulnerability Scan

2. How do you create an external IP vulnerability scan?

3 / 35

Category: Dark Web

3. How often does CYRISMA perform a data point check when you setup a dark web monitor?

4 / 35

Category: Dark Web

4. What areas of the dark web do we review to discover important information?

5 / 35

Category: Data Sensitivity Scanning

5. How many extension types can CYRISMA open to identify sensitive data?

6 / 35

Category: Instance Creation

6. How do you create a new instance for your client in the MSP Interface?

7 / 35

Category: Compliance

7. How do you setup an AD Monitor

8 / 35

Category: External Web App Vulnerability Scan

8. How do you mitigate identified web app flaws?

9 / 35

Category: Instance Creation

9. How do you access the instance you created in the MSP Interface?

10 / 35

Category: External Web App Vulnerability Scan

10. How many External Web app's can you configure for a single scan setup?

11 / 35

Category: Mitigation

11. What is a mitigation plan?

12 / 35

Category: Secure Baseline

12. Secure configuration allows you to securely configure what?

13 / 35

Category: Sensor based

13. Can you scan remote machines from a sensor?

14 / 35

Category: Setting up the Agent

14. How do you provision agents so they can download their intelligence and check in?

15 / 35

Category: Data Sensitivity Scanning

15. What are the common elements that CYRISMA Scans for when looking for sensitive data?

16 / 35

Category: Generate Overall Risk Assessment Report

16. When can the Cyber Risk Assessment report be created?

17 / 35

Category: Internal Authenticated Vulnerability scan

17. What is the best way to scan all machines at the same time for an authenticated vulnerability scan?

18 / 35

Category: Compliance

18. How do you make sure that you're able to see your Microsoft Secure Score Status within CYRISMA?

19 / 35

Category: Compliance

19. Microsoft Secure Score is used for on-prem Microsoft Configurations

20 / 35

Category: External IP Vulnerability Scan

20. How do you enter in the format for the External IP's that you want to scan?

21 / 35

Category: Sensor based

21. When the agent is a sensor, how do you import targets to scan remotely from the sensor?

22 / 35

Category: Mitigation

22. What types of mitigation plans can you create?

23 / 35

Category: Generate Overall Risk Assessment Report

23. How do I generate the Cyber Risk Assessment report and presentation?

24 / 35

Category: External Web App Vulnerability Scan

24. What type of results do you get with an External Web App Scan?

25 / 35

Category: Sensor based

25. The agent will need to have what type of account to scan a remote OS based machine

26 / 35

Category: Compliance

26. Active Directory Monitoring provides you with what type of information?

27 / 35

Category: Internal Authenticated Vulnerability scan

27. Can you select the option to get a vulnerability report once a scan has finished?

28 / 35

Category: Generate Overall Risk Assessment Report

28. The Cyber Risk Assessment Report can just be downloaded?

29 / 35

Category: Agent based

29. What options does an Agent-based scan give you?

30 / 35

Category: Secure Baseline

30. How do you identify configuration drift?

31 / 35

Category: Setting up the Agent

31. Is it required to whitelist the CYRISMA  Agent within your End Point protection?

32 / 35

Category: Mitigation

32. Can anyone create a master mitigation plan?

33 / 35

Category: Agent based

33. What is the benefit of Agent-based scanning over that of Sensor-based scanning?

34 / 35

Category: Setting up the Agent

34. What is the way best to deploy CYRISMA Agent to many machines at once?

35 / 35

Category: Data Sensitivity Scanning

35. Where can CYRISMA scan for sensitive data?

Your score is

The average score is 82%

0%