100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CYSA UPDATED ACTUAL Questions and CORRECT Answers

Beoordeling
-
Verkocht
-
Pagina's
31
Cijfer
A+
Geüpload op
28-09-2025
Geschreven in
2025/2026

CYSA UPDATED ACTUAL Questions and CORRECT Answers

Instelling
Cysa
Vak
Cysa

Voorbeeld van de inhoud

CYSA UPDATED ACTUAL Questions and CORRECT Answers

The IT team reports the EDR software that is installed on
laptops is using a large amount of resources. Which of the
following changes should a security analyst make to the
EDR to BEST improve performance without compromising
security? Whitelist known-good applications
A. Quarantine the infected systems.
B. Disable on-access scanning.
C. Whitelist known-good applications.
D. Sandbox unsigned applications.
A security analyst is reviewing the following requirements
for new time clocks that will be installed in a shipping
warehouse:The clocks must be configured so they do not
respond to ARP broadcasts.The server must be configured
with static ARP entries for each clock.Which of the follow-
Spoofing
ing types of attacks will this configuration mitigate?
A. Spoofing
B. Overflows
C. Rootkits
D. Sniflng
Which of the following sources would a security analyst
rely on to provide relevant and timely threat information
concerning the financial services industry?
A. Real-time and automated firewall rules subscriptions
Information sharing and analysis
B. Open-source intelligence, such as social media and
blogs
C. Information sharing and analysis memberships
D. Common vulnerability and exposure bulletins

An information security analyst discovered a virtual ma-
chine server was compromised by an attacker. Which of
the following should be the FIRST step to confirm and

, respond to the incident?
A. Pause the virtual machine.
B. Shut down the virtual machine. Take a snapshot of the virtual machine.
C. Take a snapshot of the virtual machine.
D. Remove the NIC from the virtual machine.
As part of an organization's information security gover-
nance process, a Chief Information Security Oflcer (CISO)
is working with the compliance oflcer to update policies
to include statements related to new regulatory and legal
requirements. Which of the following should be done to
BEST ensure all employees are appropriately aware of
changes to the policies?
Require all employees to attend updated security aware-
A. Conduct a risk assessment based on the controls de-
ness training and sign an acknowledgement.
fined in the newly revised policies.
B. Require all employees to attend updated security
awareness training and sign an acknowledgement.
C. Post the policies on the organization's intranet and pro-
vide copies of any revised policies to all active vendors.
D. Distribute revised copies of policies to employees and
obtain a signed acknowledgement from them
An analyst wants to identify hosts that are connecting to
the external FTP servers and what, if any, passwords are
being used. Which of the following commands should the
analyst use?
Tcpdump -X dst port 21
A. Tcpdump -X dst port 21
B. ftp ftp.server -p 21
C. nmap -o ftp.server -p 21
D. telnet ftp.server 21
Employees of a large financial company are continuously
being infected by strands of malware that are not detected
by EDR tools. Which of the following is the BEST security


,control to implement to reduce corporate risk while allow-
ing employees to exchange files at client sites?
A. MFA on the workstations
B. Additional host firewall rules
VDI environment
C. VDI environment
D. Hard drive encryption
E. Network access control
F. Network segmentation
While reviewing a packet capture. a security analyst dis-
covers a recent attack used specific ports communicating
across non-standard ports and exchanged a particular set
of files. In addition, forensics determines the files contain
malware and have a specific callback domain within the
files. The MOST appropriate action to take in this situation
would be to implement a change request for an IPS:
rule to block the non-standard ports and update the black-
A. to block the callback domain and another signature
listing of the callback domain
hash to block the files
B. behavioral signature and update the blacklisting on the
domain
C. rule to block the non-standard ports and update the
blacklisting of the callback domain
D. signature for the callback domain and update the fire-
wall settings to block the non-standard ports
During a review of the vulnerability scan results on a server.
an information security analyst notices the following:The
MOST appropriate action for the analyst to recommend to
developers is to charge the web server so:
It no longer accepts the vulnerable cipher suites
A. It only accepts TLSv1.2
B. It only accepts ciphers suites using AES and SHA
C. It no longer accepts the vulnerable cipher suites
D. SSL/TLS is offloaded to a WAF and load balancer


, As part of a merger with another organization, a Chief
Information Security Manager (CISO) is working with an
assessor to perform a risk assessment focused on data
privacy compliance. The CISO is primarily concerned with
the potential legal liability and fines associated with data
privacy. Based on the CISO's concerns, the assessor will quantitative magnitude
MOST likely focus on:
A. qualitative probabilities
B. quantitative probabilities
C. qualitative magnitude
D. quantitative magnitude
concerned developers have too much visibility into cus-
tomer data. Which of the following controls should be
implemented to BEST address these concerns?
A. Data masking Data masking
B. Data loss prevention
C. Data minimization
D. Data sovereignty
Which of the following will allow different cloud instances
to share various types of data with a minimal amount of
complexity?
A. Reverse engineering
API integration
B. Application log collections
C. Workflow or orchestration
D. API integration
E. Scripting
A security analyst is investigating an incident that appears
that appears to have started with SQL injection against a
publicly available web application. Which of the following
is the FIRST step the analyst should take to prevent future
attacks?

Geschreven voor

Instelling
Cysa
Vak
Cysa

Documentinformatie

Geüpload op
28 september 2025
Aantal pagina's
31
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€12,63
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
MGRADES Stanford University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1137
Lid sinds
2 jaar
Aantal volgers
104
Documenten
69677
Laatst verkocht
1 uur geleden
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3,8

179 beoordelingen

5
77
4
31
3
47
2
9
1
15

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen