CySA+Sy Test 02
Quiz
•
Information Technology (IT)
•
Professional Development
•
Medium
Josh McSwain
Used 14+ times
FREE Resource
Enhance your content
42 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
As a penetration tester, Max uses Wireshark to capture all of his testing traffic. Which of the
following is not a reason that Max would capture packets during penetration tests?
To document the penetration test
To scan for vulnerabilities
To gather additional information about systems and services
To troubleshoot issues encountered when connecting to targets
Answer explanation
Although packet capture can help Max document his penetration test and gather
additional information about remote systems through packet analysis, as well as help troubleshoot connection and other network issues, sniffers aren’t useful for scanning for vulnerabilities on their own.
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Rich recently configured new vulnerability scans for his organization’s business intelligence systems. The scans run late at night when users are not present. Rich received complaints from the business intelligence team that the performance burden imposed by the scanning is causing their overnight ETL jobs to run too slowly and they are not completing before business hours. How should Rich handle this situation?
Rich should inform the team that they need to run the ETL jobs on a different schedule.
Rich should reconfigure the scans to run during business hours.
Rich should inform the team that they must resize the hardware to accommodate both
requirements.
Rich should work with the team to find a mutually acceptable solution.
Answer explanation
Rich should not attempt to solve this problem on his own or dictate a specific solution.
Instead, he should work with the business intelligence team to find a way to both meet their
business requirements and accomplish the security goals achieved by scanning.
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Javier ran a vulnerability scan of a new web application created by developers on his team and received the report shown here. The developers inspected their code carefully and do not believe that the issue exists. They do have a strong understanding of SQL injection issues and have corrected similar vulnerabilities in other applications. What is the most likely scenario in this case?
Javier misconfigured the scan.
The code is deficient and requires correction.
The vulnerability is in a different web application running on the same server.
The result is a false positive.
Answer explanation
Blind SQL injection vulnerabilities are difficult to detect and are a notorious source of false positive reports. Javier should verify the results of the tests performed by the developers but should be open to the possibility that this is a false positive report, as that is the most likely scenario.
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
During an incident investigation, Mateo is able to identify the IP address of the system that was used to compromise multiple systems belonging to his company. What can Mateo determine from this information?
The identity of the attacker
The country of origin of the attacker
The attacker’s domain name
None of the above
Answer explanation
Although it may be tempting to assign blame based on an IP address, attackers frequently
use compromised systems for attacks. Some may also use cloud services and hosting companies where they can purchase virtual machines or other resources using stolen credit cards. Thus, knowing the IP address from which an attack originated will typically not provide
information about an attacker. In some cases, deeper research can identify where an attack
originated, but even then, knowing the identity of an attacker is rarely certain.
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
After a major compromise involving what appears to be an APT, Jaime needs to conduct a forensic examination of the compromised systems. Which containment method should he recommend to ensure that he can fully investigate the systems that were involved while minimizing the risk to his organization’s other production systems?
Sandboxing
Removal
Isolation
Segmentation
Answer explanation
Completely removing the systems involved in the compromise will ensure that they cannot impact the organization’s other production systems. Although attackers may be able to detect this change, it provides the best protection possible for the organization’s systems.
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Piper is attempting to remediate a security vulnerability and must apply a patch to a production database server. The database administration team is concerned that the patch will disrupt business operations. How should Piper proceed?
She should deploy the patch immediately on the production system.
She should wait 60 days to deploy the patch to determine whether bugs are reported.
She should deploy the patch in a sandbox environment to test it prior to applying it in
production.
She should contact the vendor to determine a safe time frame for deploying the patch in
production.
Answer explanation
Piper should deploy the patch in a sandbox environment and then thoroughly test it prior to releasing it in production. This reduces the risk that the patch will not work well in her environment. Simply asking the vendor or waiting 60 days may identify some issues, but it
does not sufficiently reduce the risk because the patch will not have been tested in her company’s
environment.
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Kent ran a vulnerability scan of an internal CRM server that is routinely used by employees, and the scan reported that no services were accessible on the server. Employees continued to use the CRM application over the Web without difficulty during the scan. What is the most likely source of Kent’s result?
The server requires strong authentication.
The server uses encryption.
The scan was run from a different network perspective than user traffic.
The scanner’s default settings do not check the ports used by the CRM application.
Answer explanation
The most likely scenario is that Kent ran the scan from a network that does not have
access to the CRM server. Even if the server requires strong authentication and/or encryption,
this would not prevent ports from appearing as open on the vulnerability scan. The CRM
server runs over the web, as indicated in the scenario. Therefore, it is most likely using ports
80 and/or 443, which are part of the default settings of any vulnerability scanner.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
38 questions
Post Assessment Intune
Quiz
•
Professional Development
40 questions
Renforcement Quizz
Quiz
•
Professional Development
46 questions
PPPK-TEKNIS TIK 2
Quiz
•
Professional Development
45 questions
Hackathon Behavioral and Technical Questions
Quiz
•
Professional Development
41 questions
Kiểm tra kiến thức máy tính
Quiz
•
Professional Development
41 questions
Safe Arch
Quiz
•
Professional Development
42 questions
ई–सृजन (उत्तराखंड) Chatbot QUIZ
Quiz
•
Professional Development
39 questions
тапсырма
Quiz
•
Professional Development
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
11 questions
NEASC Extended Advisory
Lesson
•
9th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
10 questions
Boomer ⚡ Zoomer - Holiday Movies
Quiz
•
KG - University
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
20 questions
Multiplying and Dividing Integers
Quiz
•
7th Grade
