100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

CompTIA Cybersecurity Analyst (CySA+) - Module 1 Threat Management Exam Solved 100%

Puntuación
-
Vendido
-
Páginas
18
Grado
A+
Subido en
13-09-2023
Escrito en
2023/2024

Which of the following is an alternate name for topology Discovery? Fingerprinting Footprinting Pivotprinting Sniffing - Answer Footprinting What process allows an analyst to discover the operating system and version of a system? Service Discovery Topology Discovery Log Review OS Fingerprinting - Answer OS Fingerprinting In what order is an ACL processed? From top to bottom From bottom to top Most specific entry first Least specific entry first - Answer From top to bottom What is the unwritten rule at the bottom of a firewall's ACL? Implicit Allow Implicit Deny Explicit Deny Explicit Allow - Answer Implicit Deny Attackers may potentially collect company emails by searching Google. True False - Answer True Which process would an attacker use to determine who in a company is most likely to be tricked into giving up company information? Social Engineering Phishing Social Media Profiling Email Harvesting - Answer Social Media Profiling What type of Phishing is sent over a text message specifically? Vishing Spear Phishing SMiShing Whaling - Answer SMiShing Internal DNS servers need to be protected from an attacker to prevent the leakage of email records within a company. True False - Answer False Due to the amount of a network that is physically wired it is more difficult to prevent access to a physical network than a wireless one. True False - Answer False Which of the following wireless protocols can be used to best supply security for a wireless network? WEP TKIP WPA2 WPA - Answer WPA2 A virtual network is more secure network for which of the following reasons? They are easier to patch They can't spread viruses Virtual machines can't compromise their host They're easier to isolate - Answer They're easier to isolate In which way can an IDS protect a network? (Choose all that apply) Reactively Proactively Actively Passively - Answer Reactively & Passively Which of the following methods can be used to delay a scan to avoid detection? Sparse scanning Traceroute scan half-open scan Randomized scan - Answer Sparse scanning Which tool can be used to test many different port states on a Linux or Windows device? Firewall Packet Analyze Netstat Syslog - Answer Netstat Of the IDS/ IPS systems which will have the best ability to prevent an attack on a network scale? HIDS HIPS NIDS NIPS - Answer NIPS Of the IDS/ IPS systems which will be best at protecting a system while minimizing service interruptions? HIDS HIPS NIDS NIPS - Answer HIDS When reviewing a Syslog report which of the following severities would have the highest priority? 0 4 7 10 - Answer 0 Which of the following Windows commands would allow the user to determine the path that traffic takes through the network. Traceroute Netstat NMAP Tracert - Answer Tracert Spear phishing is when an attacker goes after corporate data by calling up the CEO or other upper-level employees. True False - Answer False Employees need not be trained in current social engineering attacks as plenty of other countermeasures exist to prevent somebody from falling victim to one of these attacks such as email filters. True False - Answer False In which of the following networks types should an analyst hide the network's name in order to help prevent an attacker from finding the network? Wired Wireless Cloud Virtual - Answer Wireless

Mostrar más Leer menos
Institución
CompTIA CySA+
Grado
CompTIA CySA+










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CompTIA CySA+
Grado
CompTIA CySA+

Información del documento

Subido en
13 de septiembre de 2023
Número de páginas
18
Escrito en
2023/2024
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$11.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Exampool NURSING
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
219
Miembro desde
2 año
Número de seguidores
147
Documentos
3591
Última venta
1 mes hace
Power-horse Library

HELLO Dear ones On this Account you will find all Study related Materials ,EXAMS, STUDY GUIDES, CASES,NOTEBOOKS and many more. well come as we study for Excellency.

3.9

32 reseñas

5
16
4
2
3
10
2
2
1
2

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes