CYSA+ test bank
RTOS (real time operating system) - ANS-An analyst is performing penetration testing and
vulnerability assessment activities against a new vehicle automation platform. Which of the
following is MOST likely an attack vector that is being utilized as part of the testing and
assessment?
Use Wireshark to capture packets between SCADA devices and the management system. -
ANS-An information security analyst observes anomalous behavior on the SCADA devices in a
power plant. This behavior results in the industrial generators overheating and destabilizing the
power supply. Which of the following would BEST identify potential indicators of compromise?
Public relations - ANS-Which of the following would MOST likely be included in the incident
response procedure after a security breach of customer PII?
Install an IDS on the network between the switch and the legacy equipment. - ANS-An analyst is
working with a network engineer to resolve a vulnerability that was found in a piece of legacy
hardware, which is critical to the operation of the organization's production line. The legacy
hardware does not have third-party support, and the OEM manufacturer of the controller is no
longer in operation. The analyst documents the activities and verifies these actions prevent
remote exploitation of the vulnerability. Which of the following would be the MOST appropriate to
remediate the controller?
FPGA applications are easily cloned, increasing the possibility of intellectual property theft. -
ANS-A small electronics company decides to use a contractor to assist with the development of
a new FPGA-based device. Several of the development phases will occur off-site at the
contractor's labs. Which of the following is the main concern a security analyst should have with
this arrangement?
ICMP is being blocked by a firewall - ANS-A security analyst is trying to determine if a host is
active on a network. The analyst first attempts the following:
The analyst runs the following command next:
Which of the following would explain the difference in results?
Establish a hypothesis - ANS-A cybersecurity analyst is contributing to a team hunt on an
organization's endpoints. Which of the following should the analyst do FIRST?
Memory corruption - ANS-A security analyst received a SIEM alert regarding high levels of
memory consumption for a critical system. After several attempts to remediate the issue, the
system went down. A root cause analysis revealed a bad actor forced the application to not
reclaim memory. This caused the system to be depleted of resources. Which of the following
BEST describes this attack?
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller modockochieng06. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.99. You're not tied to anything after your purchase.