Skip survey header

CySA+ Practice Quiz: C00-002 Quiz 15

Enjoy the following 10 question quiz from TestOut.

1. A list of actions and objectives taken to mitigate risk is known as which of the following?
2. Which type of framework is fairly rigid and requires that specific controls be implemented?
3. During which of the vulnerability life cycle management phases do you implement the controls and protections from your plan of action?

4. Which of the following phases of the vulnerability management life cycle implements patches, hardening, and correction of weaknesses?

5. A security analyst was alerted in real time that there is unusual incoming traffic on the network. The traffic was not and could not be prevented or altered by the program.

Which type of program most likely sent the alert to the security analyst?
6. Your network administrator is configuring settings so the switch shuts down a port when the max number of MAC addresses is reached. What is the network administrator taking countermeasures against?
7. What are multiple RADIUS servers that communicate with each other after establishing a trust relationship called?
8. Which of the following wireless card modes is used when capturing wireless traffic with airmon-ng?
9. Your company is about to begin litigation, and you need to gather information. You need to get e-mails, memos, invoices, and other electronic documents from employees. You'd also like to get printed, physical copies of documents.

Which tool would you use to gather this information?
10. Which method can you use to verify that a bit-level image copy of a hard drive is an exact clone of the original hard drive collected as evidence?
This free quiz was provided by: