100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CompTIA Cybersecurity Analyst (CySA+) Assessment Test, Questions and answers, 100% Accurate. VERIFIED. CA$16.41   Add to cart

Exam (elaborations)

CompTIA Cybersecurity Analyst (CySA+) Assessment Test, Questions and answers, 100% Accurate. VERIFIED.

 3 views  0 purchase

CompTIA Cybersecurity Analyst (CySA+) Assessment Test, Questions and answers, 100% Accurate. VERIFIED. After running an nmap scan of a system, you receive scan data that indicates the following three ports are open:22/TCP443/TCP1521/TCP What services commonly run on these ports? A.SMTP, Net...

[Show more]

Preview 2 out of 9  pages

  • August 11, 2023
  • 9
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
All documents for this subject (35)
avatar-seller
PassPoint02
CompTIA Cybersecurity Analyst (CySA+)
Assessment Test, Questions and
answers, 100% Accurate. VERIFIED.

After running an nmap scan of a system, you receive scan data that indicates the following three ports
are open:22/TCP443/TCP1521/TCP What services commonly run on these ports?



A.SMTP, NetBIOS, MySQL

B.SSH, Microsoft DS, WINS

C.SSH, HTTPS, Oracle

D.FTP, HTTPS, MS-SQL - ✔✔-C. These three TCP ports are associated with SSH (22), HTTPS (443), and
Oracle databases (1521). Other ports mentioned in the potential answers are SMTP (25), NetBIOS (137-
139), MySQL (3306), WINS (1512), FTP (20 and 21), and MS-SQL (1433/1434).



Which of the following tools is best suited to querying data provided by organizations like the American
Registry for Internet Numbers (ARIN) as part of a footprinting or reconnaissance exercise?



A.nmap

B.traceroute

C.regmon

D.whois - ✔✔-D. Regional Internet registries like ARIN are best queried either via their websites or using
tools like Whois. Nmap is a useful port scanning utility, traceroute is used for testing the path packets
take to a remote system, and regmon is an outdated Windows Registry tool that has been supplanted by
Process Monitor.



What type of system allows attackers to believe they have succeeded with their attack, thus providing
defenders with information about their attack methods and tools?



A.A honeypot

B.A sinkhole

, C.A crackpot

D.A darknet - ✔✔-A. Honeypots are systems that are designed to look like attractive targets. When they
are attacked, they simulate a compromise, providing defenders with a chance to see how attackers
operate and what tools they use. DNS sinkholes provide false information to malicious software,
redirecting queries about command and control systems to allow remediation. Darknets are segments
of unused network space that are monitored to detect traffic—since legitimate traffic should never be
aimed at the darknet, this can be used to detect attacks and other unwanted traffic. Crackpots are
eccentric people—not a system you'll run into on a network.



What cybersecurity objective could be achieved by running your organization's web servers in
redundant, geographically separate datacenters?



A.Confidentiality

B.Integrity

C.Immutability

D.Availability - ✔✔-D. Redundant systems, particularly when run in multiple locations and with other
protections to ensure uptime, can help provide availability.



Which of the following vulnerability scanning methods will provide the most accurate detail during a
scan?



A.Black box

B.Authenticated

C.Internal view

D.External view - ✔✔-B. An authenticated, or credentialed, scan provides the most detailed view of the
system. Black-box assessments presume no knowledge of a system and would not have credentials or an
agent to work with on the system. Internal views typically provide more detail than external views, but
neither provides the same level of detail that credentials can allow.



In early 2017, a flaw was discovered in the Chakra JavaScript scripting engine in Microsoft's Edge
browser that could allow remote execution or denial of service via a specifically crafted website. The
CVSS 3.0 score for this reads

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller PassPoint02. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for CA$16.41. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

82871 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
CA$16.41
  • (0)
  Add to cart