Skip survey header

CySA+ Practice Quiz: C00-002 Quiz 1

Enjoy the following 10 question quiz from TestOut.

1. You are executing an attack in order to simulate an outside attack. Which type of penetration test are you performing?
2. Which step should be completed first during a penetration test?
3. John's company just purchased a new application for which they do not have the source code. Which of the following BEST describes the type of assessment John should use on this application?

4. Misconfigurations occur throughout a network. What is the primary cause of misconfigurations?

5. Seth logs onto his bank's website to do some online banking. While he is in the process of managing his accounts, he is unexpectedly kicked off his session. When he logs back onto his account, he finds that his accounts have been emptied.

Which type of attack was Seth most likely a victim of?
6. Which of the following is characterized by an attacker using a sniffer to monitor traffic between a victim and a host?
7. Which of the following frequency ranges does Bluetooth operate in?
8. Which of the following attacks sends unwanted messages to Bluetooth devices?
9. You have a file with sensitive data. It has a hash through a CHF. When you get to the office in the morning and access the file, you notice that the hash is different than it was the day before. What do you know about the file?
10. Kim wants to send a secure message to Tyler. She adds a secret key to her message data before she applies the SHA1 hashing algorithm. Tyler has the secret key, so he knows whether Kim's message has been altered when it arrives.

Which of the following is the process Kim followed?
This free quiz was provided by: