Skip survey header

CySA+ Practice Quiz: C00-002 Quiz 12

Enjoy the following 10 question quiz from TestOut.

1. Which framework includes the Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command and Control, and Actions on Objectives phases?
2. Which threat modeling component identifies potential threat sources, what these adversaries can do, and how likely these attacks are?
3. Which vulnerability life cycle step is BEST described as the phase in which a security analyst determines whether all the previous phases are effectively employed?

4. Which of the following are the three metrics used to determine a CVSS score?

5. You have been hired by an organization that has been victimized by session hijacking. What is one of the most important steps you as a security analyst can take to prevent further session hijacking attacks?
6. Jim, a smartphone user, receives a bill from his provider that contains fees for calling international numbers he is sure he hasn't called. Which of the following forms of Bluetooth hacking was most likely used to attack his phone?
7. Which of the following is a utility that hackers can use to locate vulnerable Bluetooth devices?
8. Taylor is a manager who is trying to find a way to get computers with different operating systems to easily interact with each other. Which of the following should she use to accomplish this?
9. Which of the following is another term that has the same meaning as beta testing?
10. Which Linux command can be used to provide a table of each running process?
This free quiz was provided by: