Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

TESTBANK FOR CompTIA CySA+ Guide to Cybersecurity Analyst (CS0-003) 3rd Edition Ciampa

Beoordeling
-
Verkocht
-
Pagina's
179
Cijfer
A+
Geüpload op
29-04-2026
Geschreven in
2025/2026

TESTBANK FOR CompTIA CySA+ Guide to Cybersecurity Analyst (CS0-003) 3rd Edition Ciampa

Instelling
Vak

Voorbeeld van de inhoud

,TESTBANK FOR CompTIA CySA+ Guide to Cybersecurity Analyst (CS0-003)
3rd Edition Ciampa

Important Notes
 The file includes the complete test bank, organized chapter by chapter.
 A sample of selected pages has been provided for preview.
 All available appendices and Excel files (if included in the original resources) are
provided.
 We continuously update our files to ensure you receive the latest and most accurate
editions.
 New editions are added regularly – stay connected for updates!

✅ Why Buy From Us?
 📚 Complete & organized chapter-by-chapter – no missing content, no guessing.
 ⚡ Instant digital delivery – get your file the moment you pay, no waiting.
 📅 Always up to date – we track new editions so you always get the latest version.
 💬 Friendly support – real humans ready to help, anytime you need us.
 🔒 Safe & secure – thousands of satisfied students trust us every semester.

🛡️Our Guarantees
 💰 Money-Back Guarantee: Not satisfied? We offer a full refund – no questions asked.
 🔄 Wrong File? No Problem: Contact us and we will replace it immediately with the
correct version, free of charge.
 ⏰ 24/7 Support: We are always here – reach out anytime and expect a fast response.


Contact Email:



,Name: Class: Date:

Chapter 01 Technology Underpinnings

1. An IT professional determines their five servers are operating at only 15 percent of capacity 95
percent of the time. Which of the following can help improve utilization?
a. Improve the IT infrastructure.
b. Modify the network architecture.
c. Implement virtualization.
d. Use serverless SDN containers.

ANSWER: c
RATIONALE: Virtualization is used to consolidate multiple physical servers into
virtual machines (VMs) that can run on a single physical computer.
Because a typical server uses only about 10 to 15 percent of its
capacity, multiple VMs can run on a single physical server.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network
architectures
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Apply
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM

2. Which of the following is a true statement regarding containerization?

a. It only holds the necessary OS components such as binary files and libraries.
b. It has a small footprint because it cannot share binary files.
c. It has a small footprint because it cannot share libraries.
d. It loads very quickly once the entire OS has been started and is up and running.

ANSWER: a
RATIONALE: With Type I and Type II hypervisors, the entire guest OS must be
started and fully functioning before an application can be
launched. A container, on the other hand, holds only the necessary
OS components, such as binary files and libraries, that are needed
for that specific application to run.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network
architectures
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Remember
DATE CREATED: 7/13/2024 3:01 PM
Copyright Cengage Learning. Powered by Cognero. Page 1

,Name: Class: Date:

Chapter 01 Technology Underpinnings

DATE MODIFIED: 7/13/2024 3:01 PM

3. Damaris works at a company that transitioned away from provisioning, deploying, or
managing physical servers. What type of infrastructure are they most likely using?
a. Serverless because they are no longer using physical servers
b. Containers because physical servers are not needed to run them
c. Serverless infrastructure
d. Wireless infrastructure

ANSWER: c
RATIONALE: A serverless infrastructure is one in which the capacity planning,
installation, setup, and management are invisible to the user
because they are handled by another entity. Serverless means that
provisioning, deploying, and managing a physical server is not
performed by the organization. However, physical servers are used
somewhere.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network
architectures
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Remember
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM

4. Which of the following best describes the ability for computing resources to be provisioned
and released with minimal management effort?
a. On-premises computing
b. Network appliances
c. Cloud computing
d. App servers

ANSWER: c
RATIONALE: Cloud computing is a model for enabling on-demand network
access to a shared pool of configurable computing resources that
can be rapidly provisioned and released with minimal management
effort or service provider interaction.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network
architectures
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
Copyright Cengage Learning. Powered by Cognero. Page 2

,Name: Class: Date:

Chapter 01 Technology Underpinnings

architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Remember
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM

5. In cloud computing, metered services are used for which of the following purposes?

a. To monitor the performance of cloud resources
b. To keep track of the amount of storage used in the cloud
c. To keep track of the computing resources used for billing
d. To keep track of the traffic flowing into a customer's cloud resources

ANSWER: c
RATIONALE: Metered services employ a pay-per-use model wherein customers
only pay for the cloud computing resources they utilize.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network
architectures
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Remember
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM

6. A company uses IoT devices, a variety of secure database servers, computing devices, and
robotic vehicles. What are the most likely computing locations the company has adopted for
these devices? Select two.
a. Edge computing for IoT devices
b. Off-premises for the desktop computers
c. On-prem for database servers
d. Fog computing for IoT devices
e. Cloud computing for robotic vehicles

ANSWER: a, c
RATIONALE: IoT typically uses edge computing. It is at or very near to the
source of data instead of relying on the cloud or on-prem for
processing. The database servers should be on-prem for security.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network
architectures

Copyright Cengage Learning. Powered by Cognero. Page 3

,Name: Class: Date:

Chapter 01 Technology Underpinnings

ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Analyze
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM

7. Which of the following best describes the differences or similarities between a jump server
and an air gap? Select two.
a. A jump server is used in a restricted area of a network called a DMZ.
b. A jump server is used to isolate a network from external sources.
c. An air gap is used in a secure area between the internal and external network.
d. An air gap server should only be accessible by a secure admin workstation.
e. An air gap server should not have USB ports or network interface cards.

ANSWER: a, e
RATIONALE: A jump server is a minimally configured administrator server
within a restricted area of the network called a demilitarized zone
(DMZ). It runs only essential protocols and ports and connects two
dissimilar security zones while providing tightly restricted access
between them. To keep a crucial network or endpoint from being
compromised, an air gap can be utilized. This isolates the network
or endpoint from all external sources, including any network
connection or external ports (like a USB port).
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network
architectures
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Analyze
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM

8. A company uses switches wherein the control logic for each switch is bundled with the
switching logic. What are the benefits or challenges presented by this type of network device?
a. It is more secure than the alternative because it has a reduced attack surface.
b. It facilitates automation because the critical elements of the switch are integrated.
c. It lacks the flexibility that allows an administrator to add, drop, or change resources
quickly.
d. The company cannot use switches from different vendors because they would be
incompatible.

ANSWER: c

Copyright Cengage Learning. Powered by Cognero. Page 4

,Name: Class: Date:

Chapter 01 Technology Underpinnings

RATIONALE: If a VM needs to be migrated, the manager must reconfigure the
VLAN on the switch every time the virtual server is moved. In
addition, in a large enterprise, whenever a new VM is installed, it
can take hours for managers to perform the necessary
reconfiguration. Thus, these devices lack the flexibility that would
allow an administrator to make changes quickly.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network
architectures
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Analyze
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM

9. After a network overhaul, an administrator is now able to manage network resources from a
central console without the need to modify individual switches. Which of the following are true
statements regarding the network?
a. Switches are capable of managing flow tables created by an SDN controller.
b. Every switch has been configured with every VLAN used by the organization.
c. New switches have been installed with an integrated control and data plane.
d. The SDN controller has been replaced with a network automation server.

ANSWER: a
RATIONALE: SDN (software-defined networking) virtualizes parts of the
physical network so that it can be more quickly and easily
reconfigured. Before traffic flows through the network, it receives
permission from the SDN controller after verification by the
network policy of the enterprise. The SDN controller computes a
route for the traffic flow and adds an entry in each of the switches
along the path. Thus, the switches simply manage flow tables
whose entries are created by the controller.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network
architectures
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Analyze
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM


Copyright Cengage Learning. Powered by Cognero. Page 5

,Name: Class: Date:

Chapter 01 Technology Underpinnings

10. Which of the following statements best describe characteristics of IT and OT? Select two.

a. OT involves the day-to-day management of IT departments.
b. IT includes testing the security of applications and systems.
c. Automated braking is an example of a specialized ICS under the IT umbrella.
d. IT includes governance to ensure IT policies are followed as defined by individual
departments.
e. OT is used to monitor and control physical processes and devices connected to the
infrastructure.

ANSWER: b, e
RATIONALE: Operations (not to be confused with operational technology)
involve the day-to-day management of IT (information
technology) departments including testing the security of
applications and systems. Operational technology (OT) is using
hardware and software to monitor and control physical processes
and the devices connected to the infrastructure that support these
processes. OT is used in a variety of industries.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.2 - Identify different types of operation technology
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Analyze
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM

11. Residents in an older neighborhood are being informed their electric meters will be replaced.
Even though the existing meters are working fine, which of the following best describes why the
utility company would choose to incur such an expense?
a. The new meters represent a specialized ICS that will help save the company money.
b. The battery in the new low-powered meters only needs to be replaced every five
years.
c. The new meters are part of a SCADA system allowing the meters to be networked
together.
d. The new meters are of the analog variety and support wireless technology for drive-by
reading.

ANSWER: a
RATIONALE: Older analog meters are being replaced with smart meters that
transmit meter readings periodically to the utility company. This
will end the need for an employee to visit the dwellings each
month to read the meters. This will help save the company money
as less resources, human or otherwise, are required.
POINTS: 1

Copyright Cengage Learning. Powered by Cognero. Page 6

,Name: Class: Date:

Chapter 01 Technology Underpinnings

QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.2 - Identify different types of operation technology
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Analyze
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM

12. Which of the following best describes the type of computerized embedded systems that
control and/or make possible automated parking and autonomous driving?
a. Specialized IT networking systems
b. Specialized ICSs
c. SCADA systems
d. IoT systems

ANSWER: b
RATIONALE: Embedded systems in cars are a type of specialized ICS (industrial
control system) that use sonar, radar, and laser emitters to control
brakes, steering, and the throttle to perform functions such as
blind-spot and pedestrian collision warnings, automated braking,
safe distance-keeping, fully automated parking, and even
autonomous driving.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.2 - Identify different types of operation technology
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Remember
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM

13. Nikola wants the ability to turn the lights on and off at her home using her cell phone while at
work. Which of the following best describes the type of device Nikola should install?
a. Networking
b. Embedded
c. SCADA
d. ICS
e. IoT

ANSWER: e
RATIONALE: IoT (Internet of Things) is connecting any device to the Internet for

Copyright Cengage Learning. Powered by Cognero. Page 7

, Name: Class: Date:

Chapter 01 Technology Underpinnings

the purpose of sending and receiving data to be acted upon. Smart
lighting uses IoT technology. Thus, Nikola can receive status
information and send a signal to set the desired state remotely.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.2 - Identify different types of operation technology
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Apply
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM

14. Which of the following best describes the consequences of a cybersecurity incident involving
IT systems and an incident involving OT systems? Select two.
a. Since both are typically on the same network, compromising one affects the other.
b. A successful attack on IT critical systems can cause physical harm.
c. A successful attack on IT systems can result in a DDoS.
d. A successful attack on OT systems can be deadly.
e. Both can be equally harmful.

ANSWER: c, d
RATIONALE: Whereas a cybersecurity incident involving IT (information
technology) may involve the theft of customer data or a successful
distributed denial-of-service (DDoS) attack, a successful attack on
OT (operational technology) systems can be significantly more
deadly and result in loss of life.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.2 - Identify different types of operation technology
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Analyze
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM

15. A security analyst is looking through some files in the /etc directory on a Linux system. What
type of files can the security analyst expect to find in this directory?
a. Configuration files
b. Application files
c. Data files
d. User files

Copyright Cengage Learning. Powered by Cognero. Page 8

Geschreven voor

Vak

Documentinformatie

Geüpload op
29 april 2026
Aantal pagina's
179
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$19.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
storetestbanks ball state university
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
271
Lid sinds
1 jaar
Aantal volgers
4
Documenten
1891
Laatst verkocht
1 dag geleden

Welcome to my store! I provide high-quality study materials designed to help students succeed and achieve better results. All documents are carefully organized, clear, and easy to follow. ✔ Complete test banks & study guides ✔ All chapters included ✔ Accurate and reliable content ✔ Perfect for exam preparation My goal is to make studying easier and save your time by providing everything you need in one place. Feel free to explore my collection and choose what fits your needs. Thank you for your support!

Lees meer Lees minder
4.7

38 beoordelingen

5
32
4
2
3
3
2
0
1
1

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen