
CySA+Sy Test 03
Authored by Josh McSwain
Information Technology (IT)
Professional Development
Used 11+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
43 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Ty is reviewing the scan report for a Windows system joined to his organization’s domain and finds the vulnerability shown here. What should be Ty’s most significant concern related to this vulnerability?
The presence of this vulnerability indicates that an attacker may have compromised his
network.
The presence of this vulnerability indicates a misconfiguration on the target server.
The presence of this vulnerability indicates that the domain security policy may be lacking
appropriate controls.
The presence of this vulnerability indicates a critical flaw on the target server that must
be addressed immediately.
Answer explanation
The presence of this vulnerability does indicate a misconfiguration on the targeted server,
but that is not the most significant concern that Ty should have. Rather, he should be alarmed
that the domain security policy does not prevent this configuration and should know that
many other systems on the network may be affected. This vulnerability is not an indicator of
an active compromise and does not rise to the level of a critical flaw.
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Heidi runs a vulnerability scan of the management interface of her organization’s virtualization platform and finds the severity 1 vulnerability shown here. What circumstance, if present, should increase the severity level of this vulnerability to Heidi?
Lack of encryption
Missing security patch
Exposure to external networks
Out-of-date antivirus signatures
Answer explanation
This vulnerability has a low severity, but that could be dramatically increased if the
management interface is exposed to external networks. If that were the case, it is possible that an attacker on a remote network would be able to eavesdrop on administrative connections and steal user credentials. Out-of-date antivirus definitions and missing security patches may also be severe vulnerabilities, but they do not increase the severity of this specific
vulnerability. The lack of encryption is already known because of the nature of this vulnerability, so confirming that fact would not change the severity assessment.
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Rowan ran a port scan against a network switch located on her organization’s internal network and discovered the results shown here. She ran the scan from her workstation on the employee VLAN. Which one of the following results should be of greatest concern to her?
Port 22
Port 23
Port 80
Ports 8192 to 8194
Answer explanation
Both ports 22 and 23 should be of concern to Rowan because they indicate that the network switch is accepting administrative connections from a general-use network. Instead, the switch should accept administrative connections only from a network management VLAN. Of these two results, port 23 should be of the greatest concern because it indicates that the switch is allowing unencrypted telnet connections that may be subject to eavesdropping. The results from ports 80 and 8192 to 8194 are of lesser concern because they are being filtered by a firewall.
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Evan is troubleshooting a vulnerability scan issue on his network. He is conducting an external scan of a website located on the web server shown in the diagram. After checking the web server logs, he saw no sign of the scan requests. Which one of the following causes is the least likely issue for him to troubleshoot?
The scans are being blocked by an intrusion prevention system.
The scans are being blocked by a rule within the web server application.
The scans are being blocked by a network firewall.
The scans are being blocked by a host firewall.
Answer explanation
All of the scenarios described here could result in failed vulnerability scans and are plausible on this network. However, the fact that the web server logs do not show any denied
requests indicates that the issue is not with the web server application itself. If this were the
case, Evan would see evidence of it in the web server logs.
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Sam is looking for evidence of software that was installed on a Windows system. He believes that the programs were deleted and that the suspect used both registry and log cleaners to hide evidence. What Windows feature can’t he use to find evidence of the use of these programs?
The MFT
Volume shadow copies
The shim (application compatibility) cache
Prefetch files
Answer explanation
The shim cache is used by Windows to track scripts and programs that need specialized
compatibility settings. It is stored in the registry at shutdown, which means that a thorough
registry cleanup will remove program references from it. The master file table (MFT), volume
shadow copies, and prefetch files can all contain evidence of deleted applications.
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Mila is evaluating the security of an application developed within her organization. She would like to assess the application’s security by supplying it with invalid inputs. What technique is Mila planning to use?
Fault injection
Stress testing
Mutation testing
Fuzz testing
Answer explanation
Fuzz testing involves sending invalid or random data to an application to test its ability to handle unexpected data. Fault injection directly inserts faults into error-handling paths, particularly error-handling mechanisms that are rarely used or might otherwise be missed during normal testing. Mutation testing is related to fuzzing and fault injection, but rather than changing the inputs to the program or introducing faults to it, mutation testing makes small modifications to the program itself. Stress testing is a performance test that ensures applications and the systems that support them can stand up to the full production load.
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A port scan conducted during a security assessment shows the following results. What type of device has most likely been scanned?
--View Image--
A wireless access point
A server
A printer
A switch
Answer explanation
Although TCP ports 21, 23, 80, and 443 are all common ports, 515 and 9100 are commonly associated with printers
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
40 questions
PPPK TEKNIS TIK 4
Quiz
•
Professional Development
38 questions
Basic Informatics Questions and Alternatives (2025)
Quiz
•
Professional Development
40 questions
BAB 5 Jaringan Komputer dan Internet
Quiz
•
Professional Development
42 questions
WAPT 2 - Up to XPATH
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Information Technology (IT)
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
100 questions
Screening Test Customer Service
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
10 questions
Reading a ruler in Inches
Quiz
•
4th Grade - Professio...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development