Skip survey header

CySA+ Practice Quiz: C00-002 Quiz 6

Enjoy the following 10 question quiz from TestOut.

1. Which of the following BEST describes an unknown penetration test?
2. Threat actors can be divided into different types based on their methods and motivations. Which type of hacker usually targets government agencies, corporations, or other entities they are protesting?
3. How is magnitude measured by a team of subject matter experts when using qualitative analysis?

4. There are two non-governmental sites that provide lists of valuable information for ethical hackers. Which of the following BEST describes the Full Disclosure site?

5. Your network administrator has set up training for all the users regarding clicking on links in emails or instant messages. Which of the following is your network administrator attempting to prevent?
6. Which of the following terms means writing access control rules to block connections from suspicious IP addresses and URLs to protect against DDoS and other attacks and sending back a reply stating that the destination is unavailable?
7. Which of the following connects a vehicle's ECUs together?
8. Which of the following types of attacks are IoT devices most vulnerable to?
9. During which phase of the IT asset life cycle do you perform maintenance, such as installing system updates and patches?
10. Where should VM administration occur?
This free quiz was provided by: