100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

CYSA UPDATED ACTUAL Questions and CORRECT Answers

Puntuación
-
Vendido
-
Páginas
31
Grado
A+
Subido en
28-09-2025
Escrito en
2025/2026

CYSA UPDATED ACTUAL Questions and CORRECT Answers

Institución
Cysa
Grado
Cysa

Vista previa del contenido

CYSA UPDATED ACTUAL Questions and CORRECT Answers

The IT team reports the EDR software that is installed on
laptops is using a large amount of resources. Which of the
following changes should a security analyst make to the
EDR to BEST improve performance without compromising
security? Whitelist known-good applications
A. Quarantine the infected systems.
B. Disable on-access scanning.
C. Whitelist known-good applications.
D. Sandbox unsigned applications.
A security analyst is reviewing the following requirements
for new time clocks that will be installed in a shipping
warehouse:The clocks must be configured so they do not
respond to ARP broadcasts.The server must be configured
with static ARP entries for each clock.Which of the follow-
Spoofing
ing types of attacks will this configuration mitigate?
A. Spoofing
B. Overflows
C. Rootkits
D. Sniflng
Which of the following sources would a security analyst
rely on to provide relevant and timely threat information
concerning the financial services industry?
A. Real-time and automated firewall rules subscriptions
Information sharing and analysis
B. Open-source intelligence, such as social media and
blogs
C. Information sharing and analysis memberships
D. Common vulnerability and exposure bulletins

An information security analyst discovered a virtual ma-
chine server was compromised by an attacker. Which of
the following should be the FIRST step to confirm and

, respond to the incident?
A. Pause the virtual machine.
B. Shut down the virtual machine. Take a snapshot of the virtual machine.
C. Take a snapshot of the virtual machine.
D. Remove the NIC from the virtual machine.
As part of an organization's information security gover-
nance process, a Chief Information Security Oflcer (CISO)
is working with the compliance oflcer to update policies
to include statements related to new regulatory and legal
requirements. Which of the following should be done to
BEST ensure all employees are appropriately aware of
changes to the policies?
Require all employees to attend updated security aware-
A. Conduct a risk assessment based on the controls de-
ness training and sign an acknowledgement.
fined in the newly revised policies.
B. Require all employees to attend updated security
awareness training and sign an acknowledgement.
C. Post the policies on the organization's intranet and pro-
vide copies of any revised policies to all active vendors.
D. Distribute revised copies of policies to employees and
obtain a signed acknowledgement from them
An analyst wants to identify hosts that are connecting to
the external FTP servers and what, if any, passwords are
being used. Which of the following commands should the
analyst use?
Tcpdump -X dst port 21
A. Tcpdump -X dst port 21
B. ftp ftp.server -p 21
C. nmap -o ftp.server -p 21
D. telnet ftp.server 21
Employees of a large financial company are continuously
being infected by strands of malware that are not detected
by EDR tools. Which of the following is the BEST security


,control to implement to reduce corporate risk while allow-
ing employees to exchange files at client sites?
A. MFA on the workstations
B. Additional host firewall rules
VDI environment
C. VDI environment
D. Hard drive encryption
E. Network access control
F. Network segmentation
While reviewing a packet capture. a security analyst dis-
covers a recent attack used specific ports communicating
across non-standard ports and exchanged a particular set
of files. In addition, forensics determines the files contain
malware and have a specific callback domain within the
files. The MOST appropriate action to take in this situation
would be to implement a change request for an IPS:
rule to block the non-standard ports and update the black-
A. to block the callback domain and another signature
listing of the callback domain
hash to block the files
B. behavioral signature and update the blacklisting on the
domain
C. rule to block the non-standard ports and update the
blacklisting of the callback domain
D. signature for the callback domain and update the fire-
wall settings to block the non-standard ports
During a review of the vulnerability scan results on a server.
an information security analyst notices the following:The
MOST appropriate action for the analyst to recommend to
developers is to charge the web server so:
It no longer accepts the vulnerable cipher suites
A. It only accepts TLSv1.2
B. It only accepts ciphers suites using AES and SHA
C. It no longer accepts the vulnerable cipher suites
D. SSL/TLS is offloaded to a WAF and load balancer


, As part of a merger with another organization, a Chief
Information Security Manager (CISO) is working with an
assessor to perform a risk assessment focused on data
privacy compliance. The CISO is primarily concerned with
the potential legal liability and fines associated with data
privacy. Based on the CISO's concerns, the assessor will quantitative magnitude
MOST likely focus on:
A. qualitative probabilities
B. quantitative probabilities
C. qualitative magnitude
D. quantitative magnitude
concerned developers have too much visibility into cus-
tomer data. Which of the following controls should be
implemented to BEST address these concerns?
A. Data masking Data masking
B. Data loss prevention
C. Data minimization
D. Data sovereignty
Which of the following will allow different cloud instances
to share various types of data with a minimal amount of
complexity?
A. Reverse engineering
API integration
B. Application log collections
C. Workflow or orchestration
D. API integration
E. Scripting
A security analyst is investigating an incident that appears
that appears to have started with SQL injection against a
publicly available web application. Which of the following
is the FIRST step the analyst should take to prevent future
attacks?

Escuela, estudio y materia

Institución
Cysa
Grado
Cysa

Información del documento

Subido en
28 de septiembre de 2025
Número de páginas
31
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$14.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
MGRADES Stanford University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1137
Miembro desde
2 año
Número de seguidores
104
Documentos
69677
Última venta
1 hora hace
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

179 reseñas

5
77
4
31
3
47
2
9
1
15

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes