Skip survey header

CySA+ Practice Quiz: C00-002 Quiz 11

Enjoy the following 10 question quiz from TestOut.

1. During which phase of the Kill Chain framework does an intruder extract or destroy data?
2. MITRE provides three main categories for attack vectors. Which of the following is an example of a human attack?
3. An attacker has made their way into an organization's network and run an LDAP enumeration tool. What is the attacker MOST likely accessing and extracting information from?

4. Which port does a DNS zone transfer use?

5. Which of the following is an attack in which all traffic is blocked by taking up all available bandwidth between the target computer and the internet?
6. A compromised computer that is used by an attacker to conduct malicious activities, like DDoS attacks, is known as which of the following?
7. Which of the following attacks targets the managed service provider itself?
8. Mary has discovered that someone hacked in and stole personal files from her Google Drive. Which type of attack was MOST likely carried out against her?
9. As you're investigating a cyber crime in your organization, you suspect that important files have been deleted. Which of the following techniques can you use to bypass the file system and recover files based only on their structure by scanning raw bytes of disk data in order to reassemble them for examination?
10. The DKIM tool can provide security for your company's e-mails because it contains which of the following?
This free quiz was provided by: