Skip survey header

CySA+ Practice Quiz: C00-002 Quiz 3

Enjoy the following 10 question quiz from TestOut.

1. Threats are usually ranked from high to low. A higher number indicates a dangerous threat. A lower number indicates threats that may be annoyances but aren't necessarily malicious in nature.

What is this high-to-low scale known as?
2. There are five phases in the security intelligence life cycle. During which phase do you gather and process information from your internal sources, such as system and application logs?
3. A ping sweep is used to scan a range of IP addresses to look for live systems. A ping sweep can also alert a security system, which could result in an alarm being triggered or an attempt being blocked.

Which type of scan is being used?

4. TCP is a connection-oriented protocol that uses a three-way handshake to establish a connection to a system port. Computer 1 sends a SYN packet to Computer 2. Which packet does Computer 2 send back?

5. A suspicious program is run in a controlled environment, where a security analyst monitors the program's execution to track the effect it has on computer resources, like its operating system. The analyst can set breakpoints or pause the program for reports on memory content, storage devices, or CPU registers.

Which reverse engineering tool is the analyst using?
6. Which of the following BEST describes a disassembler program?
7. Which of the following firewall limitations is a critical vulnerability because it means that packet filters cannot tell whether a connection was started inside or outside an organization?
8. Which of the following needs to be configured so a firewall knows which traffic to allow or block?
9. Which of the following Bring Your Own Device (BYOD) risks is both a security issue for an organization and a privacy issue for a BYOD user?
10. Which cloud service model would MOST likely be used by a software developer?
This free quiz was provided by: