COMPTIA
COMPTIA
CYBERSECURITY
CYBERSECURITY
CYBERSECURITY
ANALYST
ANALYST
ANALYST
(CYSA+)
(CYSA+)
(CYSA+)
- MODULE
- MODULE
- MODULE
4 SECURITY
4 4SECURITY
SECURITY
ARCHITECTURE
ARCHITECTURE
ARCHITECTURE
AND AND
TOOL
ANDTOOL
TOOL
SETSSETS
QUESTIONS
SETSQUESTIONS
QUESTIONS
AND AND
ANSWERS.pdf/
ANDANSWERS
ANSWERS.pdf
2026 with Solu
COMPTIA CYBERSECURITY ANALYST
(CYSA+) - MODULE 4: SECURITY
ARCHITECTURE AND TOOL SETS
QUESTIONS AND ANSWERS
Which framework was designed to widen the focus of an organization to overall architecture?
COBIT
TOGAF
SABSA
ITIL
TOGAF (The Open Group Architecture Framework)
The procedures in place to test controls need to be examined only by internal parties to ensure security.
True
False
False
Which policies are responsible for securing employee profiles?
Account Management Policy
Acceptable Use Policy
MPTIA CYBERSECURITY
COMPTIA
COMPTIA
CYBERSECURITY
CYBERSECURITY
ANALYST (CYSA+)
ANALYST
ANALYST
- MODULE
(CYSA+)
(CYSA+)
4-SECURITY
MODULE
- MODULE
4ARCHITECTURE
SECURITY
4 SECURITY
ARCHITECTURE
ARCHITECTURE
AND TOOL SETS
AND AND
TOOL
QUESTIONS
TOOL
SETSSETS
QUESTIONS
ANDQUESTIONS
ANSWERS.pdf/
AND AND
ANSWERS.pdf
2026
ANSWERS
with Solution
, COMPTIA
COMPTIA
COMPTIA
CYBERSECURITY
CYBERSECURITY
CYBERSECURITY
ANALYST
ANALYST
ANALYST
(CYSA+)
(CYSA+)
(CYSA+)
- MODULE
- MODULE
- MODULE
4 SECURITY
4 4SECURITY
SECURITY
ARCHITECTURE
ARCHITECTURE
ARCHITECTURE
AND AND
TOOL
ANDTOOL
TOOL
SETSSETS
QUESTIONS
SETSQUESTIONS
QUESTIONS
AND AND
ANSWERS.pdf/
ANDANSWERS
ANSWERS.pdf
2026 with Solu
Data Ownership Policy
Password Policy
Account Management Policy & Password Policy
Which type of control would a software in charge of managing who has access to the network be?
Administrative Control
Defined Parameters
Logical Control
Physical Control
Logical Control
Audits should be done by a third party to get a more accurate result.
True
False
True
What type of verification method is based on a judgement call?
Assessments
Audit
Evaluation
Certification
Evaluation
MPTIA CYBERSECURITY
COMPTIA
COMPTIA
CYBERSECURITY
CYBERSECURITY
ANALYST (CYSA+)
ANALYST
ANALYST
- MODULE
(CYSA+)
(CYSA+)
4-SECURITY
MODULE
- MODULE
4ARCHITECTURE
SECURITY
4 SECURITY
ARCHITECTURE
ARCHITECTURE
AND TOOL SETS
AND AND
TOOL
QUESTIONS
TOOL
SETSSETS
QUESTIONS
ANDQUESTIONS
ANSWERS.pdf/
AND AND
ANSWERS.pdf
2026
ANSWERS
with Solution
, COMPTIA
COMPTIA
COMPTIA
CYBERSECURITY
CYBERSECURITY
CYBERSECURITY
ANALYST
ANALYST
ANALYST
(CYSA+)
(CYSA+)
(CYSA+)
- MODULE
- MODULE
- MODULE
4 SECURITY
4 4SECURITY
SECURITY
ARCHITECTURE
ARCHITECTURE
ARCHITECTURE
AND AND
TOOL
ANDTOOL
TOOL
SETSSETS
QUESTIONS
SETSQUESTIONS
QUESTIONS
AND AND
ANSWERS.pdf/
ANDANSWERS
ANSWERS.pdf
2026 with Solu
Which framework is distinguished by focusing exclusively on IT security?
NIST
TOGAF
ISO
ITIL
NIST (National Institute of Standards and Technology)
What procedure is responsible for supplementing a lack of controls?
Patching
Managing Exceptions
Control Testing Procedures
Compensation Control Development
Compensation Control Development
Which policy might govern how guests may use the companies WiFi?
Data Retention Policy
Account Management Policy
Acceptable Use Policy
Data Ownership Policy
Acceptable Use Policy
A guideline is an adamant step by step listing of actions to be completed for a given task.
MPTIA CYBERSECURITY
COMPTIA
COMPTIA
CYBERSECURITY
CYBERSECURITY
ANALYST (CYSA+)
ANALYST
ANALYST
- MODULE
(CYSA+)
(CYSA+)
4-SECURITY
MODULE
- MODULE
4ARCHITECTURE
SECURITY
4 SECURITY
ARCHITECTURE
ARCHITECTURE
AND TOOL SETS
AND AND
TOOL
QUESTIONS
TOOL
SETSSETS
QUESTIONS
ANDQUESTIONS
ANSWERS.pdf/
AND AND
ANSWERS.pdf
2026
ANSWERS
with Solution