100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CYSA UPDATED ACTUAL Questions and CORRECT Answers

Rating
-
Sold
-
Pages
31
Grade
A+
Uploaded on
28-09-2025
Written in
2025/2026

CYSA UPDATED ACTUAL Questions and CORRECT Answers

Institution
Cysa
Course
Cysa











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cysa
Course
Cysa

Document information

Uploaded on
September 28, 2025
Number of pages
31
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CYSA UPDATED ACTUAL Questions and CORRECT Answers

The IT team reports the EDR software that is installed on
laptops is using a large amount of resources. Which of the
following changes should a security analyst make to the
EDR to BEST improve performance without compromising
security? Whitelist known-good applications
A. Quarantine the infected systems.
B. Disable on-access scanning.
C. Whitelist known-good applications.
D. Sandbox unsigned applications.
A security analyst is reviewing the following requirements
for new time clocks that will be installed in a shipping
warehouse:The clocks must be configured so they do not
respond to ARP broadcasts.The server must be configured
with static ARP entries for each clock.Which of the follow-
Spoofing
ing types of attacks will this configuration mitigate?
A. Spoofing
B. Overflows
C. Rootkits
D. Sniflng
Which of the following sources would a security analyst
rely on to provide relevant and timely threat information
concerning the financial services industry?
A. Real-time and automated firewall rules subscriptions
Information sharing and analysis
B. Open-source intelligence, such as social media and
blogs
C. Information sharing and analysis memberships
D. Common vulnerability and exposure bulletins

An information security analyst discovered a virtual ma-
chine server was compromised by an attacker. Which of
the following should be the FIRST step to confirm and

, respond to the incident?
A. Pause the virtual machine.
B. Shut down the virtual machine. Take a snapshot of the virtual machine.
C. Take a snapshot of the virtual machine.
D. Remove the NIC from the virtual machine.
As part of an organization's information security gover-
nance process, a Chief Information Security Oflcer (CISO)
is working with the compliance oflcer to update policies
to include statements related to new regulatory and legal
requirements. Which of the following should be done to
BEST ensure all employees are appropriately aware of
changes to the policies?
Require all employees to attend updated security aware-
A. Conduct a risk assessment based on the controls de-
ness training and sign an acknowledgement.
fined in the newly revised policies.
B. Require all employees to attend updated security
awareness training and sign an acknowledgement.
C. Post the policies on the organization's intranet and pro-
vide copies of any revised policies to all active vendors.
D. Distribute revised copies of policies to employees and
obtain a signed acknowledgement from them
An analyst wants to identify hosts that are connecting to
the external FTP servers and what, if any, passwords are
being used. Which of the following commands should the
analyst use?
Tcpdump -X dst port 21
A. Tcpdump -X dst port 21
B. ftp ftp.server -p 21
C. nmap -o ftp.server -p 21
D. telnet ftp.server 21
Employees of a large financial company are continuously
being infected by strands of malware that are not detected
by EDR tools. Which of the following is the BEST security


,control to implement to reduce corporate risk while allow-
ing employees to exchange files at client sites?
A. MFA on the workstations
B. Additional host firewall rules
VDI environment
C. VDI environment
D. Hard drive encryption
E. Network access control
F. Network segmentation
While reviewing a packet capture. a security analyst dis-
covers a recent attack used specific ports communicating
across non-standard ports and exchanged a particular set
of files. In addition, forensics determines the files contain
malware and have a specific callback domain within the
files. The MOST appropriate action to take in this situation
would be to implement a change request for an IPS:
rule to block the non-standard ports and update the black-
A. to block the callback domain and another signature
listing of the callback domain
hash to block the files
B. behavioral signature and update the blacklisting on the
domain
C. rule to block the non-standard ports and update the
blacklisting of the callback domain
D. signature for the callback domain and update the fire-
wall settings to block the non-standard ports
During a review of the vulnerability scan results on a server.
an information security analyst notices the following:The
MOST appropriate action for the analyst to recommend to
developers is to charge the web server so:
It no longer accepts the vulnerable cipher suites
A. It only accepts TLSv1.2
B. It only accepts ciphers suites using AES and SHA
C. It no longer accepts the vulnerable cipher suites
D. SSL/TLS is offloaded to a WAF and load balancer


, As part of a merger with another organization, a Chief
Information Security Manager (CISO) is working with an
assessor to perform a risk assessment focused on data
privacy compliance. The CISO is primarily concerned with
the potential legal liability and fines associated with data
privacy. Based on the CISO's concerns, the assessor will quantitative magnitude
MOST likely focus on:
A. qualitative probabilities
B. quantitative probabilities
C. qualitative magnitude
D. quantitative magnitude
concerned developers have too much visibility into cus-
tomer data. Which of the following controls should be
implemented to BEST address these concerns?
A. Data masking Data masking
B. Data loss prevention
C. Data minimization
D. Data sovereignty
Which of the following will allow different cloud instances
to share various types of data with a minimal amount of
complexity?
A. Reverse engineering
API integration
B. Application log collections
C. Workflow or orchestration
D. API integration
E. Scripting
A security analyst is investigating an incident that appears
that appears to have started with SQL injection against a
publicly available web application. Which of the following
is the FIRST step the analyst should take to prevent future
attacks?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1137
Member since
2 year
Number of followers
104
Documents
69677
Last sold
7 hours ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

179 reviews

5
77
4
31
3
47
2
9
1
15

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions