100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

CySA Exam2022 with complete solution

Puntuación
-
Vendido
-
Páginas
46
Grado
A+
Subido en
28-06-2022
Escrito en
2021/2022

CySA Exam Which one of the following objectives is not one of the three main objectives that information security professionals must achieve to protect their organizations against cybersecurity threats? Correct answer- nonrepudiation Tommy is assessing the security database servers in his datacenter and realizes that one of them is missing a critical Oracle security patch. What type of situation has Tommy detected? Correct answer- vulnerability Ben is preparing to conduct a cybersecurity risk assessment for his organization. If he chooses to follow the standard process proposed by NIST, which one of the following steps would come first? Correct answer- Identify threats Cindy is conducting a cybersecurity risk assessment and is considering the impact that a failure of her city's power grid might have on the organization. What type of threat is she considering? Correct answer- environmental Which one of the following categories of threat requires that cybersecurity analysts consider the capability, intent and targeting of the threat source? Correct answer- adversarial Vincent is responding to a security incident that compromised one of his organization's web servers. He does not believe that the attackers modified or stole any information, but they did disrupt access to the organization's website. What cybersecurity objective did this attack violate? Correct answer- availability Which one of the following is an example of an operational security control? Correct answer- penetration tests Encryption software, network firewalls, and antivirus software are all examples of _________________ security controls. Correct answer- technical Paul recently completed a risk assessment and determined that his network was vulnerable to hackers connecting to open ports on servers. He implemented a network firewall to reduce the likelihood of a successful attack. What risk management strategy did Paul choose to pursue? Correct answer- risk mitigation Robert's organization has a BYOD policy, and he would like to ensure that devices connected to the network under this policy have current antivirus software. What technology can best assist him with this goal? Correct answer- network access control When performing 802.1x authentication, what protocol does the authenticator use to communicate with the authentication server? Correct answer- RADIUS Juan is configuring a new device that will join his organization's wireless network. The wireless network uses 802.1x authentication. What type of agent must be running on the device for it to join this network? Correct answer- 802.1x supplicant Rick is preparing a firewall rule that will allow network traffic from external systems to a web server running the HTTPS protocol. What TCP port must he allow to pass through the firewall? Correct answer- 443 What type of firewall provides the greatest degree of contextual information and can include information about users and applications in its decision-making process? Correct answer- Next Generation Firewalls Wayne is configuring a jump box server that system administrators will connect to from their laptops. Which port should definitely not be open on the jump box? Correct answer- 23 Tom would like to deploy consistent security settings to all of his Windows settings simultaneously. What technology can he use to achieve this goal? Correct answer- group policy object During what phase of a penetration test should the testers obtain written authorization to conduct the test? Correct answer- planning Which step occurs first during the attack phase of a penetration test? Correct answer- gaining access Barry is participating in a cybersecurity wargame exercise. His role is to attempt to break into adversary systems. What team is he on? Correct answer- red Which one of the following techniques might be used to automatically detect and block malicious software that does not match known malware signatures? Correct answer- sandboxing Kevin would like to implement a specialized firewall that can protect against SQL injection, cross-site scripting, and similar attacks. What technology should he choose? Correct answer- WAF What method is used to replicate DNS information for DNS servers but is also a tempting exploit target for attackers? Correct answer- zone transfers ____________ is a suite of DNS security specifications. Correct answer- DNSSEC What flag does nmap use to enable operating system identification? Correct answer- -o What command line tool can be used to determine the path that traffic takes to a remote system? Correct answer- traceroute Traceroute is a command-line tool that uses __________ to trace the route that a packet takes to a host. Correct answer- ICMP What type of data can frequently be gathered from images taken on smartphones? Correct answer- EXIF EXIF or Exchangeable Image Format data often includes ________________, allowing the images to be mapped and identified to a specific device or type of camera. Correct answer- location and camera data Which Cisco log level is the most critical? Correct answer- 0 Which Cisco log level is used for debugging information and is at the bottom of the scale? Correct answer- 7 During passive intelligence gathering, you are able to run netstat on a workstation located at your target's headquarters. What information would you not be able to find using netstat on a Windows system? Correct answer- Active IPX connections Active TCP connections and the executables that are associated with them, and route table information are all available via ____________. Correct answer- Netstat Which type of Windows log is most likely to contain information about a file being deleted? Correct answer- security logs What organization manages the global IP address space? Correct answer- IANA Before Ben sends a Word document, he uses the built-in Document Inspector to verify that the file does not contain hidden content. What is this process called? Correct answer- metadata purging What type of analysis is best suited to identify a previously unknown malware package operating on a compromised system? Correct answer- heuristic analysis Which of the following is not a common DNS anti-harvesting technique? Correct answer- registering manually CAPTCHAs, rate limiting, and blacklisting systems or networks that are gathering data are all common ___________ techniques. Correct answer- anti-DNS harvesting The __________ flag indicates a zone transfer in both the dig and host utilities. Correct answer- axfr

Mostrar más Leer menos
Institución
CYSA - Certified Youth Sports Administrator
Grado
CYSA - Certified Youth Sports Administrator











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CYSA - Certified Youth Sports Administrator
Grado
CYSA - Certified Youth Sports Administrator

Información del documento

Subido en
28 de junio de 2022
Número de páginas
46
Escrito en
2021/2022
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$13.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
ErnestMichael

Conoce al vendedor

Seller avatar
ErnestMichael Yale University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
0
Miembro desde
3 año
Número de seguidores
0
Documentos
29
Última venta
-
ERNESTMICHAEL\'S LIBRARY

NEED HELP IN YOUR STUDIES? NO PROBLEM. I AM HERE TO ASSIST YOU DO YOUR STUDIES AND RESEARCH WITHOUT MUCH HUSTLE. WELCOME

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes