Skip survey header

CySA+ Practice Quiz: C00-002 Quiz 18

Enjoy the following 10 question quiz from TestOut.

1. COBIT, ITIL, and ISO are examples of which type of framework?
2. Restoring data from backup is an example of which type of security control?
3. A security analyst is concerned about flaws in the operating system being used within their company. What should their FIRST step be to remedy this?

4. Which of the following assessment types can alert you to vulnerabilities but not stop them?

5. Which of the following is a likely motivation for DoS and DDoS attacks?
6. SQL injections are a result of which of the following flaws?
7. Which Bluetooth security mode uses Diffie-Hellman techniques for key exchange and generation?
8. What is the process of connecting two Bluetooth devices together called?
9. Which of the following is a fixed-sized bit array that has random data added to each plaintext hash?
10. What is the process of adding random characters at the beginning or end of a password to generate a different hash called?
This free quiz was provided by: