Skip survey header

CySA+ Practice Quiz: C00-002 Quiz 14

Enjoy the following 10 question quiz from TestOut.

1. Which security function reacts quickly and efficiently after an issue has been detected?
2. Which security function identifies and evaluates threats in hopes of reducing their impact?
3. Which of the following is a trust relationship that exists between different organizations or applications?

4. You entered your password on a website and are sent a code to your cell phone. Which of the following is this an example of?

5. A hacker has used a SQL injection to deface a web page by inserting malicious content and altering the contents of the database. Which of the following did the hacker accomplish?
6. Which of the following cyberattacks involves an attacker inserting their own code through a data entry point created for regular users in such a way that the server accepts the malicious code as legitimate?
7. Which Bluetooth attack is targeted at Bluetooth Low Energy devices?
8. Which protocol is used in the Bluetooth pairing process?
9. Which DLP method works by replacing sensitive data with realistic fictional data?
10. URL and DNS monitoring, flow and packet analysis, and DGA monitoring are all methods to secure data in which of the following areas?
This free quiz was provided by: