Skip survey header

CySA+ Practice Quiz: C00-003 Quiz 4

Enjoy the following 10 question quiz from TestOut.

1. A small information technology department is trying to reorganize and prioritize future projects. Senior management in the company now requires the IT department to track and control changes.

What can the department use to benchmark its operations?
2. An implementation consultant is completing a project for a client implementing Microsoft Intune. Part of that mobile device management platform project is the requirement to implement baseline benchmarks for device policy.

What organization defines the best practice approaches to patching and hardening?
3. A growing e-commerce company is concerned about potential cybersecurity threats and has decided to invest in threat-hunting. The company tasks its security team with proactively identifying and mitigating threats before they escalate.

Which threat-hunting techniques would be MOST effective for the security team to prioritize their efforts?

4. A threat hunter is searching for malicious activity on a corporate network. Which of the following might they use to guide their efforts? (Choose two)

5. An information architect is currently in the process of labeling data assets for inventory use. The data inventory contains intellectual property, customer data, and confidential corporate data.

How does the architect catalog these data types into the inventory?
6. What type of scan is used to find system weaknesses, such as open ports, access points, and other potential threats?
7. Despite recovering from a crypto locker virus a year ago, a small investment firm has been hit by another attack on a computer that has not been used for over two years.

What does this scenario represent in terms of vulnerability management reporting?
8. An information security manager is creating a compliance report that will include data on policies and procedures, audit results, employee training, and gap analysis. What is the company promising to follow?
9. A security operations center (SOC) manager is working to define the playbooks for a new SOAR and wants to automatically check URLs against VirusTotal. What is an efficient and cost-effective way to automate this function?
10. A cyber security team is in the process of correlating threat data from network logs, endpoints, and intelligence feeds. Which of the following BEST describes the actions they are undertaking?
This free quiz was provided by: