Skip survey header

CySA+ Practice Quiz: C00-002 Quiz 25

Enjoy the following 10 question quiz from TestOut.

1. Which of the following would the red team MOST likely use?
2. Which of the following roles is often outsourced in risk training scenarios?
3. Charles, a security analyst, needs to check his network for vulnerabilities. He wants a scan that interacts with network nodes and repairs security issues found.

Which kind of scanning BEST describes Charles' requirements?

4. Troy, a security analyst, needs a web application scanner that is extensible and that evaluates each web application individually. Which tool is BEST for his needs?

5. Which of the following attacks sends fragmented packets that exceed 65, 535 bytes and cause a buffer overflow and system crash when reassembled?
6. Which of the following BEST describes a DoS attack?
7. Who maintains the Android source code?
8. Which layer in the Android stack acts as the intermediary between the hardware and software stack?
9. The sender's name, company position, address, and phone number are commonly found in which of the following?
10. During which phase of the incident response life cycle do you isolate affected systems and restrict communication to only trusted individuals?
This free quiz was provided by: