Skip survey header

CySA+ Practice Quiz: C00-002 Quiz 5

Enjoy the following 10 question quiz from TestOut.

1. The Department of Defense Cyber Crime Center's Vulnerability Disclosure Program and AT&T's Alien Labs Threat Exchange are examples of which type of intelligence source?
2. Sophisticated attacks executed by highly skilled hackers with a specific target or objective in mind are classified as which type of threat?
3. What should you do with e-mail from unknown or unverified user accounts?

4. Which of the following would be considered reducing the attack surface?

5. Using Wireshark filtering, you want to see all traffic except IP address Which of the following is the best command to filter a specific source IP address?
6. An attacker has captured the username and password from an executive in your organization through ARP poisoning during an on-path (man-in-the-middle) attack. Which of the following will be MOST likely to stop this form of attack in the future?
7. Which of the following best describes a wireless hotspot?
8. Which wireless component functions as a bridge between a wired and wireless network?
9. Which log type records information about system resource use, such as use by printers and servers?
10. Your company wants to be able to view all the logs on their system. Which of the following should they do to avoid privacy conflicts?
This free quiz was provided by: