Skip survey header

CySA+ Practice Quiz: C00-002 Quiz 4

Enjoy the following 10 question quiz from TestOut.

1. Which type of intelligence impacts the way managers plan day-to-day activities?
2. Which type of intelligence helps security professionals respond to incidents or make decisions on the spot?
3. What is the name of the open-source forensics tool that can be used to pull information from social media postings and find relationships between companies, people, email addresses, and other information?

4. Kjell is a security analyst and needs to see if any sensitive information is available through old website snapshots. Which tool is BEST suited for this purpose?

5. There is strong evidence that a machine is compromised on your company network, but you have not determined which computer. You are going to try to pinpoint the host by scanning for any network devices that are in promiscuous mode.

Which of the following Nmap scripts would you use?
6. You configure your switches to shut down a port immediately after it being accessed by an unauthorized user. Which type of attack are you trying to prevent?
7. Which type of wireless network does not use a wireless access point?
8. Mary is using her laptop at the local coffee shop. Before being allowed to their wireless internet, she was prompted to agree to the terms and conditions of using the network.

Which wireless access method is the coffee shop using?
9. When you create an event subscription, events are sent from one computer to another. What is the computer that receives the events called?
10. You have a large number of source computers in your IT environment. Which subscription type would be most efficient to employ?
This free quiz was provided by: