Skip survey header

CySA+ Practice Quiz: C00-002 Quiz 16

Enjoy the following 10 question quiz from TestOut.

1. Which of the following is true about confidence levels in the intrusion analysis Diamond Model?
2. Which type of security control identifies, logs, and reports incidents as they happen?
3. What is the FIRST step in vulnerability scanning penetration?

4. John's company needs a product to fix found network vulnerabilities. This product needs to run inside their firewall without help from an outside professional.

Which of the following BEST describes this type of assessment solution?

5. Which of the following can be used to segment a network and group hosts by user, department, or function regardless of physical proximity while confining its traffic to its own network?
6. Jason, an attacker, has manipulated a client's connection to disconnect the real client and allow the server to think that he is the authenticated user. Which of the following describes what Jason has done?
7. Which type of processor chip is designed to perform a single function and is typically custom-designed?
8. Which processor chip can be configured by the end user to perform the tasks he or she needs it to?
9. One of the Windows 10 workstations on your network has been reported to be generating errors with the operating system. Which of the following Event Viewer sections would be used to review these system errors?
10. At which layer is a web application firewall log used to record HTTP traffic?
This free quiz was provided by: