Computer Science > QUESTIONS & ANSWERS > CySA Exam Questions with Answers (All)
CySA Exam Questions with Answers Which one of the following objectives is not one of the three main objectives that information security professionals must achieve to protect their organizations ag ... ainst cybersecurity threats? -Answer- nonrepudiation Tommy is assessing the security database servers in his datacenter and realizes that one of them is missing a critical Oracle security patch. What type of situation has Tommy detected? -Answer- vulnerability Ben is preparing to conduct a cybersecurity risk assessment for his organization. If he chooses to follow the standard process proposed by NIST, which one of the following steps would come first? -Answer- Identify threats Cindy is conducting a cybersecurity risk assessment and is considering the impact that a failure of her city's power grid might have on the organization. What type of threat is she considering? -Answer- environmental Which one of the following categories of threat requires that cybersecurity analysts consider the capability, intent and targeting of the threat source? -Answer- adversarial Vincent is responding to a security incident that compromised one of his organization's web servers. He does not believe that the attackers modified or stole any information, but they did disrupt access to the organization's website. What cybersecurity objective did this attack violate? -Answer- availability Which one of the following is an example of an operational security control? -Answer- penetration tests Encryption software, network firewalls, and antivirus software are all examples of _________________ security controls. -Answer- technical Paul recently completed a risk assessment and determined that his network was vulnerable to hackers connecting to open ports on servers. He implemented a network firewall to reduce the likelihood of a successful attack. What risk management strategy did Paul choose to pursue? -Answer- risk mitigation Robert's organization has a BYOD policy, and he would like to ensure that devices connected to the network under this policy have current antivirus software. What technology can best assist him with this goal? -Answer- network access control When performing 802.1x authentication, what protocol does the authenticator use to communicate with the authentication server? -Answer- RADIUS Juan is configuring a new device that will join his organization's wireless network. The wireless network uses 802.1x authentication. What type of agent must be running on the device for it to join this network? -Answer- 802.1x supplicant Rick is preparing a firewall rule that will allow network traffic from external systems to a web server running the HTTPS protocol. What TCP port must he allow to pass through the firewall? -Answer- 443 What type of firewall provides the greatest degree of contextual information and can include information about users and applications in its decision-making process? -Answer- Next Generation Firewalls Wayne is configuring a jump box server that system administrators will connect to from their laptops. Which port should definitely not be open on the jump box? -Answer- 23 Tom would like to deploy consistent security settings to all of his Windows settings simultaneously. What technology can he use to achieve this goal? -Answer- group policy object During what phase of a penetration test should the testers obtain written authorization to conduct the test? -Answer- planning Which step occurs first during the attack phase of a penetration test? -Answer- gaining access Barry is participating in a cybersecurity wargame exercise. His role is to attempt to break into adversary systems. What team is he on? -Answer- red Which one of the following techniques might be used to automatically detect and block malicious software that does not match known malware signatures? -Answer- sandboxing Kevin would like to implement a specialized firewall that can protect against SQL injection, cross-site scripting, and similar attacks. What technology should he choose? -Answer- WAF What method is used to replicate DNS information for DNS servers but is also a tempting exploit target for attackers? -Answer- zone transfers ____________ is a suite of DNS security specifications. -Answer- DNSSEC What flag does nmap use to enable operating system identification? -Answer- -o What command line tool can be used to determine the path that traffic takes to a remote system? -Answer- traceroute [Show More]
Last updated: 3 years ago
Preview 1 out of 46 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
CySA+ 231 More Questions with 100% Correct Answers CySA+ 2022 Questions and Answers with complete solution CySA+ Final - Study Guide 2022 with complete solution Final SAS study guide Question...
By Professor Lynne 3 years ago
$18
17
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Sep 05, 2022
Number of pages
46
Written in
All
This document has been written for:
Uploaded
Sep 05, 2022
Downloads
0
Views
150
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·