TestOut - CompTIA CySA+ Practice Questions 6.6.8
You are monitoring your network's traffic, looking for signs of strange activity. After looking at the
logs, you see that there was a recent spike in database read volume.
Could this be a problem and why?
A. No. A spike in database read volume is only a problem if it happens multiple times in a short
period.
B. Yes. A spike in database read volume can show that someone is trying to use a brute force
attack.
C. Yes. A spike in database read volume can show that a hacker has downloaded a great deal
of information from the database.
D. No. A spike in database read volume is a normal occurrence that is not suspicious. - ANS-C.
Yes. A spike in database read volume can show that a hacker has downloaded a great deal of
information from the database.
Explanation
A spike in database read volume can show that a hacker has downloaded a great deal of
information from the database, which can be used to injure the organization.
It is not a direct indication of a brute force attack.
Any spike in database read volume should be investigated.
While performing a password audit on a Windows machine in your organization with
L0phtCrack, you receive the following results.
Based on what you see below, which two accounts should worry you the most? (Select two.)
A. Administrator
B. Mihai
C. Brandon
D. Guest
E. DefaultAccount - ANS-A. Administrator
B. Mihai
Explanation
The Administrator and Mihai accounts are most concerning. The Administrator account has full
access to the machine and no password is currently set. The Mihai account has a simple
password (apple) and was likely added as a user account on the system.
The Guest account is built in, as is the DefaultAccount. Both the DefaultAccount and Guest
accounts are disabled by default and have limited rights when enabled.
The Brandon account appears to have a stronger password and was not cracked during the
audit.
, You are looking through your network usage logs and notice logins from a variety of geographic
locations that are far from where your employees usually log in.
Could this be a problem and why?
A. Yes. Logins from strange geographical locations can show that a hacker is trying to gain
access from a remote location.
B. No. Logins from strange geographical locations happen when data is sent to distant servers.
C. Yes. Logins from strange geographical locations can show that your own employees are
trying to hack you.
D. No. Logins from strange geographical locations often happen from employees working
remotely. - ANS-A. Yes. Logins from strange geographical locations can show that a hacker is
trying to gain access from a remote location.
Explanation
Strange geographical logins can be a problem because hackers often show up as logging in
from a strange place.
Sending data to a distant server would not have a login from that location.
If employees are working remotely, you should be aware of their location and recognize it.
Your company has had a problem with users getting hacked even though you have established
strong password policies.
What is the next logical step to increase your company's security?
A. Revise your company's password policy.
B. Purchase new computers for all your employees.
C. Implement two or more methods of authentication.
D. Train the employees on the different types of hackers. - ANS-C. Implement two or more
methods of authentication.
Explanation
Using two or more methods of authentication is known as multi-factor authentication and will
increase the security of your company's user accounts.
Getting new computers will not solve the problem.
Revising your company's password policy will not solve the problem.
Training company employees about different types of hackers will not make their user accounts
more secure.
Over time, changes in the way people use networks have complicated protecting a network
against security threats.
Which of the following trends has increased the need for security? (Select two.)
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller modockochieng06. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.99. You're not tied to anything after your purchase.