Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CYSA EXAM TEST 2023 LATEST UPDATE

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
26-02-2024
Written in
2023/2024

CYSA EXAM TEST 2023 LATEST UPDATE An analyst is performing penetration testing and vulnerability assessment activities against a new vehicle automation platform. Which of the following is MOST likely an attack vector that is being utilized as part of the testing and assessment? - ANSWER CAN Bus A cyber-incident response analyst is investigating a suspected cryptocurrency miner on a company's server. Which of the following is the FIRST step the analyst should take? - ANSWER Start packet capturing to look for traffic that could be indicative of command and control from the miner. A security analyst is investigating a malware infection that occurred on a Windows system. The system was not connected to a network and had no wireless capability Company policy prohibits using portable media or mobile storage The security analyst is trying to determine which use caused the malware to get onto the system Which of the following registry keys would MOST likely have this information? - ANSWER HKEY_USERSuser SIDSoftwareMicrosoftWindowsexplorerMountPoints2 Which of the following MOST accurately describes an HSM? - ANSWER An HSM can be networked based or a removable USB A security analyst is investigating malicious traffic from an internal system that attempted to download proxy avoidance software as identified from the firewall logs but the destination IP is blocked and not captured. Which of the following should the analyst do? - ANSWER Shut down the computer Which of the following technologies can be used to house the entropy keys for disk encryption on desktops and laptops? - ANSWER Self-encrypting drive A developer wrote a script to make names and other Pll data unidentifiable before loading a database export into the testing system Which of the following describes the type of control that is being used - ANSWER Data loss prevention or Data masking A security analyst receives an alert that highly sensitive information has left the company's network Upon investigation, the analyst discovers an outside IP range has had connections from three servers more than 100 times m the past month The affected servers are virtual machines Which of the following is the BEST course of action? - ANSWER Shut down the servers as soon as possible, move them to a clean environment, restart, run a vulnerability scanner to find weaknesses determine the root cause, remediate, and report A security analyst is investigating a compromised Linux server. The analyst issues the ps command and receives the following output. 1301 ? Ss 0:00 ./usr/sbin/sshd -D Which of the following commands should the administrator run NEXT to further analyze the compromised system? - ANSWER A. strace /proc/1301 A small organization has proprietary software that is used internally. The system has not been well maintained and cannot be updated with the rest of the environment Which of the following is the BEST solution? - ANSWER Virtualize the system and decommission the physical machine. Which of the following attacks can be prevented by using output encoding? - ANSWER Cross-site scripting A security analyst is responding to an incident on a web server on the company network that is making a large number of outbound requests over DNS. Which of the following is them FIRST step the analyst should take to evaluate this potential indicator of compromise? - ANSWER Run an anti-malware scan on the system to detect and eradicate the current threat An information security analyst is compiling data from a recent penetration test and reviews the following output: 443/tcp open https? The analyst wants to obtain more information about the web-based services that are running on the target. - ANSWER telnet 10.79.95.173 443 A security analyst conducted a risk assessment on an organization's wireless network and identified a high-risk element in the implementation of data confidentially protection. Which of the following is the BEST technical security control to mitigate this risk? - ANSWER Switch to TACACS+ technology. A security analyst discovers accounts in sensitive SaaS-based systems are not being removed in a timely manner when an employee leaves the organization To BEST resolve the issue, the organization should implement - ANSWER federated authentication A compliance officer of a large organization has reviewed the firm's vendor management program but has discovered there are no controls defined to evaluate third-party risk or hardware source authenticity. The compliance officer wants to gain some level of assurance on a recurring basis regarding the implementation of controls by third parties. Which of the following would BEST satisfy the objectives defined by the compliance officer? (Choose two.) - ANSWER Executing vendor compliance assessments against the organization's security controls. Soliciting third-party audit reports on an annual basis. An audit has revealed an organization is utilizing a large number of servers that are running unsupported operating systems. As part of the management response phase of the audit, which of the following would BEST demonstrate senior management is appropriately aware of and addressing the issue? - ANSWER Minutes from meetings in which risk assessment activities addressing the servers were discussed A security analyst is reviewing packet captures from a system that was compromised. The system was already isolated from the network, but it did have network access for a few hours after being compromised. When viewing the capture in a packet analyzer, the analyst sees the following: 10.1.1.10.47789 128.50.100.3.53:48202+ A? - ANSWER Data is being exfiltrated over DNS.

Show more Read less
Institution
CYSA
Course
CYSA









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CYSA
Course
CYSA

Document information

Uploaded on
February 26, 2024
Number of pages
6
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$12.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
stuviagenius18 Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
322
Member since
2 year
Number of followers
172
Documents
2868
Last sold
3 months ago
EXCELLENT HOMEWORK HELP AND TUTORING ,ALL KIND OF QUIZ AND EXAMS WITH GUARANTEE OF A EXCELLENT HOMEWORK HELP AND TUTORING ,ALL KIND OF QUIZ AND EXAMS WITH GUARANTEE OF A Am an expert on major courses especially; psychology,Nursing, Human resource Manageme

EXCELLENT HOMEWORK HELP AND TUTORING ,ALL KIND OF QUIZ AND EXAMS WITH GUARANTEE OF A EXCELLENT HOMEWORK HELP AND TUTORING ,ALL KIND OF QUIZ AND EXAMS WITH GUARANTEE OF A Am an expert on major courses especially; psychology,Nursing, Human resource Management and Mathemtics Assisting students with quality work is my first priority. I ensure scholarly standards in my documents and that\'s why i\'m one of the BEST GOLD RATED TUTORS in STUVIA. I assure a GOOD GRADE if you will use my work.

Read more Read less
3.9

51 reviews

5
24
4
11
3
9
2
3
1
4

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions