CompTIA CySA+ Practice Test – Final Exam Questions and Correct Answers.
0 view 0 purchase
Course
CompTIA CySA+
Institution
CompTIA CySA+
CompTIA CySA+ Practice Test – Final Exam Questions and
Correct Answers.
An engineer uses enumeration tools to identify hosts on a network. Which description
relates to a footprinting approach? - Correct Answer IP address usage, routing topology,
and DNS namespace
Identify the Software Develo...
CompTIA CySA+ Practice Test – Final Exam Questions and
Correct Answers.
An engineer uses enumeration tools to identify hosts on a network. Which description
relates to a footprinting approach? - Correct Answer IP address usage, routing topology,
and DNS namespace
Identify the Software Development Life Cycle (SDLC) step where developers perform
"black box" or "grey box" analysis to test for vulnerabilities in the published application, as
well as in its publication environment. - Correct Answer Testing
A cloud access security broker (CASB) appliance uses connection brokers between the
cloud service and the cloud consumer to mediate access to services. What mode is the
CASB operating? - Correct Answer Application Programming Interface (API) mode
Following the general principle in capturing evidence in the order of volatility, which of the
following is the most non-volatile option available? - Correct Answer Archival media
The company deployed a new intrusion prevention system (IPS) at the network edge as
well as a host-based IPS. USB devices are now immediately blocked at the client
endpoint. What can the team do to ensure the effectiveness of the network IPS? Select
all that apply. - Correct Answer Ghost an incident scenario, Utilize Metasploit's
framework.
A server crashed abruptly and there were no logs or indication of a system failure. Before
connecting the server to the network, an admin installed Memoryze to monitor its activity.
How can this application benefit the system's security? - Correct Answer Image the full
system memory.
Which business impact metric describes the period following a disaster where an
individual IT system may remain offline? - Correct Answer RTO
How can someone securely dispose of documents with classified information? - Correct
Answer Burning
A corporate network finds itself undergoing a large-scale breach. The cybersecurity team
can't identify the sources of attack fast enough. Assess the situation and recommend an
immediate solution. - Correct Answer Setup a whitelist
, When governing data in a company, which role is responsible for maintaining the
confidentiality, integrity, and availability of the information asset? - Correct Answer Data
owner
The team deployed a new security monitoring application and backup solution because
the legacy applications were out-of-date. A recent incident response revealed that the
team was not able to meet their recovery time objective. What are some actions that can
improve future recovery times? Select all that apply. - Correct Answer Update the
documentation, Follow the change control process.
A network security analyst is attempting to identify a threat on a potentially malware
infected host. The analyst isolated the host and limited it to a basic Linux command line.
What default Linux command used to list running processes did the analyst use to identify
a program or service opening the connection? - Correct Answer ps
Select the categories of Event Logs in Windows. Select all that apply. - Correct Answer
Setup logs, Application logs, Security logs
Which of the following is an indicator of compromise within a server? Select all that apply.
- Correct Answer Regular user account with admin privileges, Unauthorized software
installed
A drone pilot experiences difficulty remote controlling the aircraft. The pilot feels that a
questionable firmware update is to blame. Which technology refers to the type the drone
uses? - Correct Answer CAN bus
A security expert finishes bringing a system online after a breach. When writing a report
on the incident, the expert documents aspects of the exploit interaction. These aspects
outline how the incident utilized a category of cyber related approaches including social
media messaging. Which of the following security related terms does the expert refers
to? - Correct Answer Attack vector
A security key is required from the CPU vendor to make buffer overflow attacks
impossible. This allows application processes to be identified as trusted. Define the
security method that accomplishes this goal. - Correct Answer Secure enclave
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Lectjosh. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $18.49. You're not tied to anything after your purchase.