100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CySA Exam 2021/2022 With Complete Solution $13.49   Add to cart

Exam (elaborations)

CySA Exam 2021/2022 With Complete Solution

 5 views  0 purchase
  • Course
  • Institution

Which one of the following objectives is not one of the three main objectives that information security professionals must achieve to protect their organizations against cybersecurity threats? Correct answer- nonrepudiation Tommy is assessing the security database servers in his datacenter and r...

[Show more]

Preview 4 out of 46  pages

  • April 8, 2022
  • 46
  • 2021/2022
  • Exam (elaborations)
  • Questions & answers
avatar-seller
CySA Exam

Which one of the following objectives is not one of the three main objectives that
information security professionals must achieve to protect their organizations against
cybersecurity threats? Correct answer- nonrepudiation

Tommy is assessing the security database servers in his datacenter and realizes that
one of them is missing a critical Oracle security patch. What type of situation has
Tommy detected? Correct answer- vulnerability

Ben is preparing to conduct a cybersecurity risk assessment for his organization. If he
chooses to follow the standard process proposed by NIST, which one of the following
steps would come first? Correct answer- Identify threats

Cindy is conducting a cybersecurity risk assessment and is considering the impact that
a failure of her city's power grid might have on the organization. What type of threat is
she considering? Correct answer- environmental

Which one of the following categories of threat requires that cybersecurity analysts
consider the capability, intent and targeting of the threat source? Correct answer-
adversarial

Vincent is responding to a security incident that compromised one of his organization's
web servers. He does not believe that the attackers modified or stole any information,
but they did disrupt access to the organization's website. What cybersecurity objective
did this attack violate? Correct answer- availability

Which one of the following is an example of an operational security control? Correct
answer- penetration tests

Encryption software, network firewalls, and antivirus software are all examples of
_________________ security controls. Correct answer- technical

Paul recently completed a risk assessment and determined that his network was
vulnerable to hackers connecting to open ports on servers. He implemented a network
firewall to reduce the likelihood of a successful attack. What risk management strategy
did Paul choose to pursue? Correct answer- risk mitigation

Robert's organization has a BYOD policy, and he would like to ensure that devices
connected to the network under this policy have current antivirus software. What
technology can best assist him with this goal? Correct answer- network access control

,When performing 802.1x authentication, what protocol does the authenticator use to
communicate with the authentication server? Correct answer- RADIUS

Juan is configuring a new device that will join his organization's wireless network. The
wireless network uses 802.1x authentication. What type of agent must be running on
the device for it to join this network? Correct answer- 802.1x supplicant

Rick is preparing a firewall rule that will allow network traffic from external systems to a
web server running the HTTPS protocol. What TCP port must he allow to pass through
the firewall? Correct answer- 443

What type of firewall provides the greatest degree of contextual information and can
include information about users and applications in its decision-making process?
Correct answer- Next Generation Firewalls

Wayne is configuring a jump box server that system administrators will connect to from
their laptops. Which port should definitely not be open on the jump box? Correct
answer- 23

Tom would like to deploy consistent security settings to all of his Windows settings
simultaneously. What technology can he use to achieve this goal? Correct answer-
group policy object

During what phase of a penetration test should the testers obtain written authorization to
conduct the test? Correct answer- planning

Which step occurs first during the attack phase of a penetration test? Correct answer-
gaining access

Barry is participating in a cybersecurity wargame exercise. His role is to attempt to
break into adversary systems. What team is he on? Correct answer- red

Which one of the following techniques might be used to automatically detect and block
malicious software that does not match known malware signatures? Correct answer-
sandboxing

Kevin would like to implement a specialized firewall that can protect against SQL
injection, cross-site scripting, and similar attacks. What technology should he choose?
Correct answer- WAF

What method is used to replicate DNS information for DNS servers but is also a
tempting exploit target for attackers? Correct answer- zone transfers

____________ is a suite of DNS security specifications. Correct answer- DNSSEC

What flag does nmap use to enable operating system identification? Correct answer- -o

,What command line tool can be used to determine the path that traffic takes to a remote
system? Correct answer- traceroute

Traceroute is a command-line tool that uses __________ to trace the route that a
packet takes to a host. Correct answer- ICMP

What type of data can frequently be gathered from images taken on smartphones?
Correct answer- EXIF

EXIF or Exchangeable Image Format data often includes ________________, allowing
the images to be mapped and identified to a specific device or type of camera. Correct
answer- location and camera data

Which Cisco log level is the most critical? Correct answer- 0

Which Cisco log level is used for debugging information and is at the bottom of the
scale? Correct answer- 7

During passive intelligence gathering, you are able to run netstat on a workstation
located at your target's headquarters. What information would you not be able to find
using netstat on a Windows system? Correct answer- Active IPX connections

Active TCP connections and the executables that are associated with them, and route
table information are all available via ____________. Correct answer- Netstat

Which type of Windows log is most likely to contain information about a file being
deleted? Correct answer- security logs

What organization manages the global IP address space? Correct answer- IANA

Before Ben sends a Word document, he uses the built-in Document Inspector to verify
that the file does not contain hidden content. What is this process called? Correct
answer- metadata purging

What type of analysis is best suited to identify a previously unknown malware package
operating on a compromised system? Correct answer- heuristic analysis

Which of the following is not a common DNS anti-harvesting technique? Correct
answer- registering manually

CAPTCHAs, rate limiting, and blacklisting systems or networks that are gathering data
are all common ___________ techniques. Correct answer- anti-DNS harvesting

The __________ flag indicates a zone transfer in both the dig and host utilities. Correct
answer- axfr

, Which of the following is not a reason that penetration testers often perform packet
capture while conducting port and vulnerability scanning? Correct answer- plausible
deniability

A ____________ is often used to document work, including the time that a given scan
or process occurred, and it can also be used to provide additional data for further
analysis. Correct answer- packet capture

What process uses information such as the way that a system's TCP stack responds to
queries, what TCP options it supports, and the initial window size it uses? Correct
answer- OS detection

What tool would you use to capture IP traffic information to provide flow and volume
information about a network? Correct answer- netflow

__________ provides information about local connections, which applications have
made them, and other useful local system information. Correct answer- netstat

What method used to replicate DNS information between DNS servers can also be
used to gather large amounts of information about an organization's systems? Correct
answer- zone transfer

Selah believes that an organization she is penetration testing may have exposed
information about their systems on their website in the past. What site might help her
find an older copy of their website? Correct answer- The Internet Archive

During an information gathering exercise, Chris is asked to find out detailed personal
information about his target's employees. What is frequently the best place to find this
information? Correct answer- social media

Which lookup tool provides information about a domain's registrar and physical
location? Correct answer- Whois

____________ will provide IP address or hostname information. Correct answer-
nslookup

__________ will provide IPv4 and IPv6 information as well as email service information.
Correct answer- host

___________ attempts to identify the path to a remote host as well as the systems
along the route. Correct answer- traceroute

What federal law requires the use of vulnerability scanning on information systems
operated by federal government agencies? Correct answer- FISMA

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller EvaTee. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

73091 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.49
  • (0)
  Add to cart