Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Exam (elaborations) CYSA2023

Rating
-
Sold
-
Pages
19
Grade
A+
Uploaded on
03-05-2024
Written in
2023/2024

The IT team reports the EDR software that is installed on laptops is using a large amount of resources. Which of the following changes should a security analyst make to the EDR to BEST improve performance without compromising security? A. Quarantine the infected systems. B. Disable on-access scanning. C. Whitelist known-good applications. D. Sandbox unsigned applications. - ANSWER Whitelist known-good applications A security analyst is reviewing the following requirements for new time clocks that will be installed in a shipping warehouse:The clocks must be configured so they do not respond to ARP broadcasts.The server must be configured with static ARP entries for each clock.Which of the following types of attacks will this configuration mitigate? A. Spoofing B. Overflows C. Rootkits D. Sniffing - ANSWER Spoofing Which of the following sources would a security analyst rely on to provide relevant and timely threat information concerning the financial services industry? A. Real-time and automated firewall rules subscriptions B. Open-source intelligence, such as social media and blogs C. Information sharing and analysis memberships D. Common vulnerability and exposure bulletins - ANSWER Information sharing and analysis An information security analyst discovered a virtual machine server was compromised by an attacker. Which of the following should be the FIRST step to confirm and respond to the incident? A. Pause the virtual machine. B. Shut down the virtual machine. C. Take a snapshot of the virtual machine. D. Remove the NIC from the virtual machine. - ANSWER Take a snapshot of the virtual machine. As part of an organization's information security governance process, a Chief Information Security Officer (CISO) is working with the compliance officer to update policies to include statements related to new regulatory and legal requirements. Which of the following should be done to BEST ensure all employees are appropriately aware of changes to the policies? A. Conduct a risk assessment based on the controls defined in the newly revised policies. B. Require all employees to attend updated security awareness training and sign an acknowledgement. C. Post the policies on the organization's intranet and provide copies of any revised policies to all active vendors. D. Distribute revised copies of policies to employees and obtain a signed acknowledgement from them - ANSWER Require all employees to attend updated security awareness training and sign an acknowledgement. An analyst wants to identify hosts that are connecting to the external FTP servers and what, if any, passwords are being used. Which of the following commands should the analyst use? A. Tcpdump -X dst port 21 B. ftp r -p 21 C. nmap -o r -p 21 D. telnet r 21 - ANSWER Tcpdump -X dst port 21 Employees of a large financial company are continuously being infected by strands of malware that are not detected by EDR tools. Which of the following is the BEST security control to implement to reduce corporate risk while allowing employees to exchange files at client sites? A. MFA on the workstations B. Additional host firewall rules C. VDI environment D. Hard drive encryption E. Network access control F. Network segmentation - ANSWER VDI environment While reviewing a packet capture. a security analyst discovers a recent attack used specific ports communicating across non-standard ports and exchanged a particular set of files. In addition, forensics determines the files contain malware and have a specific callback domain within the files. The MOST appropriate action to take in this situation would be to implement a change request for an IPS: A. to block the callback domain and another signature hash to block the files B. behavioral signature and update the blacklisting on the domain C. rule to block the non-standard ports and update the blacklisting of the callback domain

Show more Read less
Institution
Course

Content preview

CYSA EXAM 2023
QUESTIONS AND
VERIFIED CORRECT
ANSWERS
The IT team reports the EDR software that is installed on laptops is using a large
amount of resources. Which of the following changes should a security analyst make to
the EDR to BEST improve performance without compromising security?
A. Quarantine the infected systems.
B. Disable on-access scanning.
C. Whitelist known-good applications.
D. Sandbox unsigned applications. - ANSWER Whitelist known-good applications

A security analyst is reviewing the following requirements for new time clocks that will
be installed in a shipping warehouse:The clocks must be configured so they do not
respond to ARP broadcasts.The server must be configured with static ARP entries for
each clock.Which of the following types of attacks will this configuration mitigate?
A. Spoofing
B. Overflows
C. Rootkits
D. Sniffing - ANSWER Spoofing

Which of the following sources would a security analyst rely on to provide relevant and
timely threat information concerning the financial services industry?
A. Real-time and automated firewall rules subscriptions
B. Open-source intelligence, such as social media and blogs
C. Information sharing and analysis memberships
D. Common vulnerability and exposure bulletins - ANSWER Information sharing and
analysis

An information security analyst discovered a virtual machine server was compromised
by an attacker. Which of the following should be the FIRST step to confirm and respond
to the incident?
A. Pause the virtual machine.
B. Shut down the virtual machine.
C. Take a snapshot of the virtual machine.
D. Remove the NIC from the virtual machine. - ANSWER Take a snapshot of the virtual
machine.

,As part of an organization's information security governance process, a Chief
Information Security Officer (CISO) is working with the compliance officer to update
policies to include statements related to new regulatory and legal requirements. Which
of the following should be done to BEST ensure all employees are appropriately aware
of changes to the policies?
A. Conduct a risk assessment based on the controls defined in the newly revised
policies.
B. Require all employees to attend updated security awareness training and sign an
acknowledgement.
C. Post the policies on the organization's intranet and provide copies of any revised
policies to all active vendors.
D. Distribute revised copies of policies to employees and obtain a signed
acknowledgement from them - ANSWER Require all employees to attend updated
security awareness training and sign an acknowledgement.

An analyst wants to identify hosts that are connecting to the external FTP servers and
what, if any, passwords are being used. Which of the following commands should the
analyst use?
A. Tcpdump -X dst port 21
B. ftp ftp.server -p 21
C. nmap -o ftp.server -p 21
D. telnet ftp.server 21 - ANSWER Tcpdump -X dst port 21

Employees of a large financial company are continuously being infected by strands of
malware that are not detected by EDR tools. Which of the following is the BEST security
control to implement to reduce corporate risk while allowing employees to exchange
files at client sites?
A. MFA on the workstations
B. Additional host firewall rules
C. VDI environment
D. Hard drive encryption
E. Network access control
F. Network segmentation - ANSWER VDI environment

While reviewing a packet capture. a security analyst discovers a recent attack used
specific ports communicating across non-standard ports and exchanged a particular set
of files. In addition, forensics determines the files contain malware and have a specific
callback domain within the files. The MOST appropriate action to take in this situation
would be to implement a change request for an IPS:
A. to block the callback domain and another signature hash to block the files
B. behavioral signature and update the blacklisting on the domain
C. rule to block the non-standard ports and update the blacklisting of the callback
domain

, D. signature for the callback domain and update the firewall settings to block the non-
standard ports - ANSWER rule to block the non-standard ports and update the
blacklisting of the callback domain

During a review of the vulnerability scan results on a server. an information security
analyst notices the following:The MOST appropriate action for the analyst to
recommend to developers is to charge the web server so:
A. It only accepts TLSv1.2
B. It only accepts ciphers suites using AES and SHA
C. It no longer accepts the vulnerable cipher suites
D. SSL/TLS is offloaded to a WAF and load balancer - ANSWER It no longer accepts
the vulnerable cipher suites

As part of a merger with another organization, a Chief Information Security Manager
(CISO) is working with an assessor to perform a risk assessment focused on data
privacy compliance. The CISO is primarily concerned with the potential legal liability and
fines associated with data privacy. Based on the CISO's concerns, the assessor will
MOST likely focus on:
A. qualitative probabilities
B. quantitative probabilities
C. qualitative magnitude
D. quantitative magnitude - ANSWER quantitative magnitude

concerned developers have too much visibility into customer data. Which of the
following controls should be implemented to BEST address these concerns?
A. Data masking
B. Data loss prevention
C. Data minimization
D. Data sovereignty - ANSWER Data masking

Which of the following will allow different cloud instances to share various types of data
with a minimal amount of complexity?
A. Reverse engineering
B. Application log collections
C. Workflow or orchestration
D. API integration
E. Scripting - ANSWER API integration

A security analyst is investigating an incident that appears that appears to have started
with SQL injection against a publicly available web application. Which of the following is
the FIRST step the analyst should take to prevent future attacks?
A. Modify the IDS rules to have a signature for SQL injection.
B. Take the server offline to prevent continue SQL injection.
C. Create a WAF rule in block mode for SQL injection.
D. Ask the developers to implement parameterized SQL queries. - ANSWER Ask the
developers to implement parameterized SQL queries.

Written for

Course

Document information

Uploaded on
May 3, 2024
Number of pages
19
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$15.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
leonardkinyua2

Get to know the seller

Seller avatar
leonardkinyua2 (self)
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
2 year
Number of followers
0
Documents
12
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions