CySA+Sy Test 02

CySA+Sy Test 02

Professional Development

42 Qs

quiz-placeholder

Similar activities

Post Assessment Intune

Post Assessment Intune

Professional Development

38 Qs

Renforcement Quizz

Renforcement Quizz

Professional Development

40 Qs

9-16 бет

9-16 бет

Professional Development

43 Qs

Trader Joe's History Quiz

Trader Joe's History Quiz

Professional Development

40 Qs

ई–सृजन (उत्तराखंड) Chatbot QUIZ

ई–सृजन (उत्तराखंड) Chatbot QUIZ

Professional Development

42 Qs

e-srijan uttarakhand

e-srijan uttarakhand

Professional Development

42 Qs

CySA+Sy Test 04

CySA+Sy Test 04

Professional Development

43 Qs

тапсырма

тапсырма

Professional Development

39 Qs

CySA+Sy Test 02

CySA+Sy Test 02

Assessment

Quiz

Information Technology (IT)

Professional Development

Medium

Created by

Josh McSwain

Used 14+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

42 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

As a penetration tester, Max uses Wireshark to capture all of his testing traffic. Which of the

following is not a reason that Max would capture packets during penetration tests?

To document the penetration test

To scan for vulnerabilities

To gather additional information about systems and services

To troubleshoot issues encountered when connecting to targets

Answer explanation

Although packet capture can help Max document his penetration test and gather

additional information about remote systems through packet analysis, as well as help troubleshoot connection and other network issues, sniffers aren’t useful for scanning for vulnerabilities on their own.

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Rich recently configured new vulnerability scans for his organization’s business intelligence systems. The scans run late at night when users are not present. Rich received complaints from the business intelligence team that the performance burden imposed by the scanning is causing their overnight ETL jobs to run too slowly and they are not completing before business hours. How should Rich handle this situation?

Rich should inform the team that they need to run the ETL jobs on a different schedule.

Rich should reconfigure the scans to run during business hours.

Rich should inform the team that they must resize the hardware to accommodate both

requirements.

Rich should work with the team to find a mutually acceptable solution.

Answer explanation

Rich should not attempt to solve this problem on his own or dictate a specific solution.

Instead, he should work with the business intelligence team to find a way to both meet their

business requirements and accomplish the security goals achieved by scanning.

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

Javier ran a vulnerability scan of a new web application created by developers on his team and received the report shown here. The developers inspected their code carefully and do not believe that the issue exists. They do have a strong understanding of SQL injection issues and have corrected similar vulnerabilities in other applications. What is the most likely scenario in this case?

Javier misconfigured the scan.

The code is deficient and requires correction.

The vulnerability is in a different web application running on the same server.

The result is a false positive.

Answer explanation

Blind SQL injection vulnerabilities are difficult to detect and are a notorious source of false positive reports. Javier should verify the results of the tests performed by the developers but should be open to the possibility that this is a false positive report, as that is the most likely scenario.

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

During an incident investigation, Mateo is able to identify the IP address of the system that was used to compromise multiple systems belonging to his company. What can Mateo determine from this information?

The identity of the attacker

The country of origin of the attacker

The attacker’s domain name

None of the above

Answer explanation

Although it may be tempting to assign blame based on an IP address, attackers frequently

use compromised systems for attacks. Some may also use cloud services and hosting companies where they can purchase virtual machines or other resources using stolen credit cards. Thus, knowing the IP address from which an attack originated will typically not provide

information about an attacker. In some cases, deeper research can identify where an attack

originated, but even then, knowing the identity of an attacker is rarely certain.

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

After a major compromise involving what appears to be an APT, Jaime needs to conduct a forensic examination of the compromised systems. Which containment method should he recommend to ensure that he can fully investigate the systems that were involved while minimizing the risk to his organization’s other production systems?

Sandboxing

Removal

Isolation

Segmentation

Answer explanation

Completely removing the systems involved in the compromise will ensure that they cannot impact the organization’s other production systems. Although attackers may be able to detect this change, it provides the best protection possible for the organization’s systems.

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Piper is attempting to remediate a security vulnerability and must apply a patch to a production database server. The database administration team is concerned that the patch will disrupt business operations. How should Piper proceed?

She should deploy the patch immediately on the production system.

She should wait 60 days to deploy the patch to determine whether bugs are reported.

She should deploy the patch in a sandbox environment to test it prior to applying it in

production.

She should contact the vendor to determine a safe time frame for deploying the patch in

production.

Answer explanation

Piper should deploy the patch in a sandbox environment and then thoroughly test it prior to releasing it in production. This reduces the risk that the patch will not work well in her environment. Simply asking the vendor or waiting 60 days may identify some issues, but it

does not sufficiently reduce the risk because the patch will not have been tested in her company’s

environment.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Kent ran a vulnerability scan of an internal CRM server that is routinely used by employees, and the scan reported that no services were accessible on the server. Employees continued to use the CRM application over the Web without difficulty during the scan. What is the most likely source of Kent’s result?

The server requires strong authentication.

The server uses encryption.

The scan was run from a different network perspective than user traffic.

The scanner’s default settings do not check the ports used by the CRM application.

Answer explanation

The most likely scenario is that Kent ran the scan from a network that does not have

access to the CRM server. Even if the server requires strong authentication and/or encryption,

this would not prevent ports from appearing as open on the vulnerability scan. The CRM

server runs over the web, as indicated in the scenario. Therefore, it is most likely using ports

80 and/or 443, which are part of the default settings of any vulnerability scanner.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?