Skip survey header

CySA+ Practice Quiz: C00-003 Quiz 7

Enjoy the following 10 question quiz from TestOut.

1. A mid-sized company wants to incorporate e-commerce to improve sales. The company has decided to hire an information security consultant to assist in bolstering security measures in preparation for the company's new changes.

The consultant is focusing on the potential risk associated with storing and processing bank information. What information security standard is the consultant concentrating efforts on?
2. A security engineer is improving their company's security posture. During that process, the engineer is looking to implement an industry-grade framework, one known for its practical information about application security.

Which organization best fits this need and description?
3. Which of the following BEST describes system logs?

4. Behavioral threat research combines IoCs to show patterns and techniques used in previous attacks. Which of the following threat indicators is normally associated with viruses?

5. A security administrator wants to scan the company's network for vulnerabilities. Which of these scanners is an open-source software developed from the Nessus codebase?
6. A security analyst is conducting a vulnerability assessment for a client. The client's network has multiple operating systems and devices, and the analyst needs to determine if there are any security weaknesses that an attacker could exploit.

What can the analyst use to identify vulnerabilities in the client's network and devices?
7. Which of the following attacks exploit vulnerabilities in the web application and allows the attacker to compromise a user's interactions with the app?
8. A hacker has used a SQL injection to deface a web page by inserting malicious content and altering the contents of the database.
Which of the following did the hacker accomplish?
9. After handling a near loss of data, a medical facility decides to work with regulators to mitigate future risks. Who should the facility communicate with next?
10. A company has just experienced a data breach that exposed sensitive customer information. The company's security team has determined that the breach likely originated from a specific IP address.

What entity should the company notify in this situation?
This free quiz was provided by: