Skip survey header

CySA+ Practice Quiz: C00-002 Quiz 17

Enjoy the following 10 question quiz from TestOut.

1. Which security control category controls system oversight?
2. Security guards are included in which control category?
3. Allen's company has raised concerns about network information that can be observed without a hacker being discovered. Which of the following BEST describes the type of assessment that could be used to operate in this manner?

4. Which of the following is the last phase of the vulnerability management life cycle?

5. The field in the image below is supposed to return just the username associated with the user ID (a number). The output in the image, however, includes more information, including the username running the database.

What is being exploited here?
6. A security analyst is testing to find SQL injection vulnerabilities. She uses automation of a large volume of random data inserted into the web application's input fields in order to check the output.

Which type of testing was done?
7. Which of the following attacks works by registering an elapsed DNS name?
8. Which security control layer involves putting in place policies that comply with industry standards, such as OWASP?
9. Including a legitimate-looking embedded link to a malicious site in an email purporting to be from a legitimate source is which of the following types of cyberattack?
10. Which of the following is one of the five phases of the incident response life cycle?
This free quiz was provided by: