Skip survey header

CySA+ Practice Quiz: C00-002 Quiz 7

Enjoy the following 10 question quiz from TestOut.

1. Threats that do not have an existing fix, do not have any security fixes, and do not have available patches are called what?
2. Miguel has been practicing his hacking skills. He has discovered a vulnerability on a system that he did not have permission to attack. Once Miguel discovered the vulnerability, he anonymously alerted the owner and instructed them on how to secure the system.

Which type of hacker is Miguel in this scenario?
3. By default, Lightweight Directory Access Protocol (LDAP) is unsecure, but it should not be blocked since it is widely used in normal operations. Instead, you should use the secure version.

Which of the following ports is used for the secure version of LDAP?

4. A security specialist is taking countermeasures for SNMP. Which of the following utilities would he or she MOST likely use to detect vulnerable SNMP devices on the network?

5. Which of the following protocols is most secure?
6. An attacker has, through reconnaissance, discovered the MAC address to Sam Black's computer. Sam is a user in your network with admin privileges. The attacker uses a software tool that allows him or her to mimic Sam's MAC address and use it to access your network.

Which type of attack has the attacker performed?
7. Which of the following should be performed first to determine WAP placement?
8. Which of the following Kali Linux utilities can be used to find Bluetooth devices? (Choose two)
9. Which phase includes taking the recommendations that can be put into action through security implementations, policies, and procedures?
10. During which phase of the incident response life cycle do you reinforce your systems, policies, and procedures to ensure that your resources are well secured?
This free quiz was provided by: