Skip survey header

CySA+ Practice Quiz: C00-002 Quiz 10

Enjoy the following 10 question quiz from TestOut.

1. Which type of threat actor only uses their skills and knowledge for defensive purposes?
2. What seven-phase framework did Lockheed Martin develop to identify an attacker's step-by-step attack process?
3. Which of the following is a dictionary of known patterns of cyberattacks used by hackers?

4. How many numbering authorities comprise the CVE?

5. In actively defending against SQL injection attacks, you create queries that have placeholders for values from your users' input. Which of the following SQL injection countermeasures did you implement with these queries?
6. You have configured an NIDS to monitor network traffic. Which of the following describes harmless traffic that has been identified as a potential attack by the NIDS device?
7. A company has subscribed to a cloud service that offers cloud applications and storage space. Through acquisition, the number of company employees quickly doubled. The cloud service vendor was able to add cloud services for these additional employees without requiring hardware changes.

Which of the following cloud concepts does this represent?
8. Which of the following cloud service models delivers software applications to a client either over the internet or on a local area network?
9. Having downloaded an .iso file for a project you are preparing for, and you want to validate that the file is from the vendor and hasn't been tampered with. You have downloaded the md5 hash signature for the .iso and need to validate the file.

Which Windows PowerShell utility would you use?
10. Which of the following is used to verify that a downloaded file has not been altered?
This free quiz was provided by: