Skip survey header

CySA+ Practice Quiz: C00-002 Quiz 13

Enjoy the following 10 question quiz from TestOut.

1. During which phase of the Kill Chain framework is malware code encapsulated into commonly used file formats, such as PDF files, image files, or Word documents?
2. Which threat modeling measurement is used to describe how an attack can exploit a vulnerability?
3. Which of the following information sharing policies addresses the sharing of critical information in press releases, annual reports, product catalogs, and marketing materials?

4. Which of the following would an external assessment check?

5. A user might enter a password and then be prompted to enter a security code that's sent to his or her mobile device. Which of the following is this an example of?
6. Which of the following is a popular honeypot that can be used to create thousands of other honeypots?
7. Which of the following is the client responsible for in a PaaS cloud service model?
8. You are using Software as a Service (SaaS) in your office. Who is responsible for the security of the data stored in the cloud?
9. You have had a data breach in your organization and employees have submitted their mobile devices for review. You look through each device's interface and take pictures of evidence you see on the screen.

Which type of data acquisition have you just performed?
10. Which of the following forensic tools is security software that gathers data from devices, analyzes it for suspicious activity, stores it in a central database, and flags irregularities with a notification to the security analyst?
This free quiz was provided by: