Skip survey header

CySA+ Practice Quiz: C00-002 Quiz 28

Enjoy the following 10 question quiz from TestOut.

1. Ron, a hacker, wants to gain access to a prestigious law firm he has been watching for a while. June, an administrative assistant at the law firm, is having lunch at the food court around the corner from her office. Ron notices that June has a picture of a dog on her phone. He casually walks by and starts a conversation about dogs.

Which phase of the social engineering process is Ron in?
2. Which of the following best describes an inside attacker?
3. Which of the following would be the best open-source tool to use if you were looking for a web server scanner?

4. The Results section of an assessment report contains four subtopics. Which of the following subsections contains the origin of the scan?

5. Converting the word ATTACK to u0041 u0054 u0054 u0041 u0043 u004b is an example of what technique?
6. In what order are rules in an ACL processed?
7. Which of the following policies BEST governs the use of Bring Your Own Device (BYOD) when connecting to an organization's private network?
8. Which of the following mobile security best practices is concerned with geotags?
9. You are testing a new application using a combination of known and unknown testing. How would you BEST describe this approach?
10. If you are testing software without looking at the backend code, which kind of testing are you engaging in?
This free quiz was provided by: