100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
CySA Exam 2021/2022 With Complete Solution €12,65   In winkelwagen

Tentamen (uitwerkingen)

CySA Exam 2021/2022 With Complete Solution

 5 keer bekeken  0 keer verkocht
  • Vak
  • Instelling

Which one of the following objectives is not one of the three main objectives that information security professionals must achieve to protect their organizations against cybersecurity threats? Correct answer- nonrepudiation Tommy is assessing the security database servers in his datacenter and r...

[Meer zien]

Voorbeeld 4 van de 46  pagina's

  • 8 april 2022
  • 46
  • 2021/2022
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
avatar-seller
CySA Exam

Which one of the following objectives is not one of the three main objectives that
information security professionals must achieve to protect their organizations against
cybersecurity threats? Correct answer- nonrepudiation

Tommy is assessing the security database servers in his datacenter and realizes that
one of them is missing a critical Oracle security patch. What type of situation has
Tommy detected? Correct answer- vulnerability

Ben is preparing to conduct a cybersecurity risk assessment for his organization. If he
chooses to follow the standard process proposed by NIST, which one of the following
steps would come first? Correct answer- Identify threats

Cindy is conducting a cybersecurity risk assessment and is considering the impact that
a failure of her city's power grid might have on the organization. What type of threat is
she considering? Correct answer- environmental

Which one of the following categories of threat requires that cybersecurity analysts
consider the capability, intent and targeting of the threat source? Correct answer-
adversarial

Vincent is responding to a security incident that compromised one of his organization's
web servers. He does not believe that the attackers modified or stole any information,
but they did disrupt access to the organization's website. What cybersecurity objective
did this attack violate? Correct answer- availability

Which one of the following is an example of an operational security control? Correct
answer- penetration tests

Encryption software, network firewalls, and antivirus software are all examples of
_________________ security controls. Correct answer- technical

Paul recently completed a risk assessment and determined that his network was
vulnerable to hackers connecting to open ports on servers. He implemented a network
firewall to reduce the likelihood of a successful attack. What risk management strategy
did Paul choose to pursue? Correct answer- risk mitigation

Robert's organization has a BYOD policy, and he would like to ensure that devices
connected to the network under this policy have current antivirus software. What
technology can best assist him with this goal? Correct answer- network access control

,When performing 802.1x authentication, what protocol does the authenticator use to
communicate with the authentication server? Correct answer- RADIUS

Juan is configuring a new device that will join his organization's wireless network. The
wireless network uses 802.1x authentication. What type of agent must be running on
the device for it to join this network? Correct answer- 802.1x supplicant

Rick is preparing a firewall rule that will allow network traffic from external systems to a
web server running the HTTPS protocol. What TCP port must he allow to pass through
the firewall? Correct answer- 443

What type of firewall provides the greatest degree of contextual information and can
include information about users and applications in its decision-making process?
Correct answer- Next Generation Firewalls

Wayne is configuring a jump box server that system administrators will connect to from
their laptops. Which port should definitely not be open on the jump box? Correct
answer- 23

Tom would like to deploy consistent security settings to all of his Windows settings
simultaneously. What technology can he use to achieve this goal? Correct answer-
group policy object

During what phase of a penetration test should the testers obtain written authorization to
conduct the test? Correct answer- planning

Which step occurs first during the attack phase of a penetration test? Correct answer-
gaining access

Barry is participating in a cybersecurity wargame exercise. His role is to attempt to
break into adversary systems. What team is he on? Correct answer- red

Which one of the following techniques might be used to automatically detect and block
malicious software that does not match known malware signatures? Correct answer-
sandboxing

Kevin would like to implement a specialized firewall that can protect against SQL
injection, cross-site scripting, and similar attacks. What technology should he choose?
Correct answer- WAF

What method is used to replicate DNS information for DNS servers but is also a
tempting exploit target for attackers? Correct answer- zone transfers

____________ is a suite of DNS security specifications. Correct answer- DNSSEC

What flag does nmap use to enable operating system identification? Correct answer- -o

,What command line tool can be used to determine the path that traffic takes to a remote
system? Correct answer- traceroute

Traceroute is a command-line tool that uses __________ to trace the route that a
packet takes to a host. Correct answer- ICMP

What type of data can frequently be gathered from images taken on smartphones?
Correct answer- EXIF

EXIF or Exchangeable Image Format data often includes ________________, allowing
the images to be mapped and identified to a specific device or type of camera. Correct
answer- location and camera data

Which Cisco log level is the most critical? Correct answer- 0

Which Cisco log level is used for debugging information and is at the bottom of the
scale? Correct answer- 7

During passive intelligence gathering, you are able to run netstat on a workstation
located at your target's headquarters. What information would you not be able to find
using netstat on a Windows system? Correct answer- Active IPX connections

Active TCP connections and the executables that are associated with them, and route
table information are all available via ____________. Correct answer- Netstat

Which type of Windows log is most likely to contain information about a file being
deleted? Correct answer- security logs

What organization manages the global IP address space? Correct answer- IANA

Before Ben sends a Word document, he uses the built-in Document Inspector to verify
that the file does not contain hidden content. What is this process called? Correct
answer- metadata purging

What type of analysis is best suited to identify a previously unknown malware package
operating on a compromised system? Correct answer- heuristic analysis

Which of the following is not a common DNS anti-harvesting technique? Correct
answer- registering manually

CAPTCHAs, rate limiting, and blacklisting systems or networks that are gathering data
are all common ___________ techniques. Correct answer- anti-DNS harvesting

The __________ flag indicates a zone transfer in both the dig and host utilities. Correct
answer- axfr

, Which of the following is not a reason that penetration testers often perform packet
capture while conducting port and vulnerability scanning? Correct answer- plausible
deniability

A ____________ is often used to document work, including the time that a given scan
or process occurred, and it can also be used to provide additional data for further
analysis. Correct answer- packet capture

What process uses information such as the way that a system's TCP stack responds to
queries, what TCP options it supports, and the initial window size it uses? Correct
answer- OS detection

What tool would you use to capture IP traffic information to provide flow and volume
information about a network? Correct answer- netflow

__________ provides information about local connections, which applications have
made them, and other useful local system information. Correct answer- netstat

What method used to replicate DNS information between DNS servers can also be
used to gather large amounts of information about an organization's systems? Correct
answer- zone transfer

Selah believes that an organization she is penetration testing may have exposed
information about their systems on their website in the past. What site might help her
find an older copy of their website? Correct answer- The Internet Archive

During an information gathering exercise, Chris is asked to find out detailed personal
information about his target's employees. What is frequently the best place to find this
information? Correct answer- social media

Which lookup tool provides information about a domain's registrar and physical
location? Correct answer- Whois

____________ will provide IP address or hostname information. Correct answer-
nslookup

__________ will provide IPv4 and IPv6 information as well as email service information.
Correct answer- host

___________ attempts to identify the path to a remote host as well as the systems
along the route. Correct answer- traceroute

What federal law requires the use of vulnerability scanning on information systems
operated by federal government agencies? Correct answer- FISMA

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

√  	Verzekerd van kwaliteit door reviews

√ Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, Bancontact of creditcard voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper EvaTee. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €12,65. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 77764 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€12,65
  • (0)
  Kopen