CYSA+ Flashcards
A cyber security consultant is examining security control classes for an Infrastructure as a Service (IaaS) provider. The classes measure how effectively assets are protected. Which security control class would the consultant examine to gain oversight of the information system?
a. technical
b. managerial
c. operational
d. detective
B. Managerial
The managerial control gives oversight of the information system. Examples could include risk identification or a tool allowing the evaluation and selection of other security controls.
A mission-critical system is offline at an organization due to a zero-day attack. The associated software vendor plans to release a patch to remediate the vulnerability. Which of the following are important patch management considerations for this scenario? (Select the three best options.)
A. a patch test environment
B. speedy push delivery of critical security patches
C. a specific team responsible for reviewing vendor-supplied newsletters and security patch bulletins
D. a routine schedule for the rollout of noncritical patches
A, B, and C
A support manager is giving essential security training to the help desk. Which control class is the support manager implementing?
a. operational
b. technical
c. detective
d. managerial
A. operational
Operational controls are primarily implemented and executed by people (as opposed to systems). For instance, security guards and training programs are examples of operational controls.
An IT director reviews a cyber security audit and learns that an old accounting server is significantly out of compliance. Rather than attempting repairs, the director concludes that decommissioning the server is the safest course of action. What is the risk management principle the IT director is following?
a. risk acceptance
b. risk mitigation
c. risk avoidance
d. risk transference
C. risk avoidance
An organization recently had an attack that resulted in system data loss. The system administrator must now restore the system with a data backup. What functional security control was the system administrator able to implement?
a. preventative
b. responsive
c. corrective
d. compensating
C. corrective
A good example of a corrective control is a backup system that can restore data that an attacker damages during an intrusion.
A CEO of a small corporation has decided to continue using a legacy system despite security concerns. This is an example of which risk management principle?
a. risk acceptance
b. risk avoidance
c. risk mitigation
d. risk transference
a. risk acceptance
A security engineer installs a next-generation firewall on the perimeter of a network. This installation is an example of what type of security control class?
a. managerial
b. operational
c. detective
d. technical
d. technical
The legal affairs team of an international conglomerate elects to assign certain risks to a third party. Which risk management principle are they implementing?
a. risk acceptance
b. risk avoidance
c. risk mitigation
d. risk transference
d. risk transference
Risk transference (or sharing) means the company would assign risk to a third party, which they would typically accomplish through insurance policies. Insurance transfers financial risks to a third party.
An engineer is considering appropriate risk responses using threat modeling. They are trying to understand which threat actors are in scope for their organization. How does threat modeling identify the principal risks and tactics, techniques, and procedures (TTPs) for which their system may be susceptible? (Select the three best options.)
a. by evaluating the system from an attacker’s point of view
b. by evaluating a system from a neutral perspective
c. through using tools such as diagrams
d. by analyzing the system from the defender’s perspective
A, C, and D
A system administrator is performing patchwork on their organization’s system. The administrator realizes the maintenance window will close before they complete the patchwork. What action must the administrator take to abide by the change management policy?
a. rollback to the system’s previous state
b. rollout earlier patches
c. rollback to a system’s initial state
d. rollout system patches
a. rollback to the system’s previous state
A system administrator is hardening a newly provisioned server with software patches and security updates. What functional security control is the system administrator performing?
a. detective
b. preventative
c. corrective
d. compensating
b. preventative
A support team is preparing for an upcoming maintenance window. What tasks should the support team accomplish during the proactive maintenance windows? (Select the three best options.)
a. implement untested patches
b. restart devices
c. analyze events
d. restore critical services after a backup test
B, C, and D
A security analyst reviews a firewall log’s source IP addresses to investigate an attack. These logs are a representation of what type of functional security control?
a. corrective
b. preventative
c. detective
d. compensating
c. detective
A large corporation’s security operations center (SOC) team is processing a recent incident. The team refers to a playbook for guidance about the incident. What type of functional security control does the playbook represent?
a. corrective
b. preventative
c. responsive
d. compensating
c. responsive
Responsive controls serve to direct corrective actions enacted after the SOC team confirms the incident. The team often documents these actions in a playbook.
A systems administrator runs a scan on an application server and finds several vulnerabilities. The issues are not severe, and patches are available in each instance. The administrator decided to install the available patches. What risk management principle did they demonstrate?
a. risk mitigation
b. risk acceptance
c. risk avoidance
d. risk transference
a. risk mitigation
A cybersecurity analyst wants to collect indicators of compromise (IoCs) to identify, investigate, and mitigate threats. What are some examples of IoCs that the analyst will be collecting? (Select the three best options.)
a. expected configuration changes
b. odd network patterns
c. unusual account behaviors
d. unfamiliar new files
B, C, and D
A geographically diverse group of hackers commit fraud against a small company for commercial gain. What type of threat actor committed this fraud?
a. organized crime
b. hacktivist
c. nation-state
d. insider threat
a. organized crime
A security analyst is analyzing systems for potential misconfiguration. Misconfiguration hunting is an important focus area. What are some key items the analyst should search for while misconfiguration hunting? (Select the three best options.)
a. weak passwords
b. open ports
c. unpatched software
d. isolated networks
A, B, and C
A security consultant is using the dark web as a source of defensive open-source intelligence (OSINT). Which of the following should the consultant be aware of when using the dark web? (Select the three best options.)
a. the dark web is protected by a single layer of encryption
b. the dark web serves as an operating platform for cybercrimes
c. threat actors leverage the dark web for criminal activities
d. the dark web can provide evidence of previously undiscovered breaches
B, C , and D
A threat actor obtains and releases confidential information about a political candidate to the public domain. The information damages the person’s candidacy and helps the opposing party. These actions were likely performed by which type of threat actor?
a. insider threat
b. script kiddie
c. organized crime
d. hacktivist
D. hacktivist
A security analyst is reviewing an announcement from the Cybersecurity and Infrastructure Security Agency. Which source of defensive open-source intelligence (OSINT) does the agency represent?
a. CERT
b. internal sources
c. government bulletins
d. CSIRT
c. government bulletins
Agents from a sovereign region in North Africa perform a cyber attack against the energy infrastructure of a neighboring republic. What type of threat actor does this scenario illustrate?
a. insider threat
b. organized crime
c. hacktivist
d. nation-state
d. nation-state
Nation-state actors have participated in many attacks, particularly on energy and electoral systems. The goals of nation-state actors are primarily espionage and strategic advantage.
An attacker is browsing social media accounts associated with a targeted organization. Why is the attacker using social media in this manner? (Select the three best options.)
a. attackers can use social media sites to find an organization information
b. attackers can leverage social media as a vector to launch attacks against targets
c. attackers can use information from social media as a source of defensive OSINT
d. an attacker may find posts or user profiles that give away sensitive information
A, B, and D
An attacker is planning to target a business-critical database for a large enterprise. What are some business-critical asset-hunting methods that security analysts use to protect systems? (Select the two best options.)
a. search for unauthorized access attempts
b. search for misconfigured systems
c. search for unusual traffic patterns
d. search for routine activity
A and C
Business-critical asset hunting involves searching for vulnerabilities and threats that could impact these assets.
A large corporation has established a team specifically tasked with responding to routine, non-emergency security incidents. Which of the following terms best describes this team?
a. CERT
b. internal sources
c. CSIRT
d. government bulletins
c. CSIRT
A computer security incident response team (CSIRT) is a group responsible for responding to security incidents involving computer systems.
Someone with a casual interest in hacking techniques launches a random attack against a widely known enterprise using tools readily available online. What type of threat actor is likely behind this attack?
a. insider threat
b. script kiddie
c. organized crime
d. hacktivist
b. script kiddie
A computer emergency response team (CERT) is quickly reacting to an attack on the network infrastructure of a semiconductor manufacturer. What is true about a CERT? (Select the three best options.)
a. CERTS mitigate cybercrime
b. CERTS work with local law enforcement
c. CERTS provide knowledge of trending attacks
d. CERTS publish a wide variety of information concerning threats
A, b, and C
A systems administrator is researching active defense approaches. The administrator decides to install a honeypot to lure attackers away from assets of actual value. What is true of a honeypot? (Select the three best options.)
a. honeypots seek to redirect malicious traffic away from live production systems
b. honeypots can provide an early warning regarding ongoing attacks
c. honeypots help collect intelligence on the attackers and their techniques
d. honeypots assist defensive teams in identifying and responding after an attack has taken place on critical systems
A, b, and c
A systems administrator is searching for potential vulnerabilities in the network. Which threat-hunting focus area should the administrator examine, as attackers often exploit it through connected systems or physical access?
a. isolated networks
b. misconfigured systems
c. business-critical assets
d. lateral movements
a. isolated networks
Isolated networks, such as air-gapped networks or networks with limited connectivity to the internet, are often thought to be more secure. However, attackers can still target these networks by exploiting vulnerabilities in connected systems or through physical access.
Which of the following are characteristics of an advanced persistent threat? (Select the three best options.)
a. remove evidence of the attack
b. target large organizations
c. spend little time gathering intelligence
d. develop highly specific exploits
A, B, and D
A cloud architect advises an associate to consider a serverless platform for their new endeavor. What benefits would the architect highlight about a serverless platform? (Select the two best options.)
a. serverless platforms require the mgmt of physical or virtual server instances
b. there are considerable mgmt demands for file system security monitoring
c. there is no requirement to provision multiple servers for redundancy or load balancing
d. the service provider manages the underlying architecture
C and D
A security analyst needs a data loss prevention (DLP) solution to prevent users from transferring data without authorization. What components typically make up DLP solutions? (Select the three best options.)
a. policy servers
b. USB devices
c. endpoint agents
d. network agents
A, C, and D
What computing environment can an administrator use to install multiple independent operating systems on a single hardware platform and run them simultaneously?
a. container
b. serverless computing
c. microservices
d. virtualization
d. virtualization
A systems administrator is setting up single sign-on (SSO) for a company. What are some of the primary benefits of SSO to an organization? (Select the two best options.)
a. SSO allows users to access multiple resources using only a single set of credentials
b. SSO allows users to access multiple websites using only a single set of credentials
c. SSO dramatically reduces usability
d. SSO eliminates the risk of breached credentials
A and B
A cloud consultant is investigating cloud deployment types for a client. The client requires both onsite and offsite infrastructure. Which of the following deployment types should the consultant recommend to their client?
a. public
b. hybrid
c. microservices
d. private
b. hybrid
An engineer is studying the hardware architecture of a company’s various systems. The engineer can find the x86 architecture in which of the following items? (Select the three best options.)
a. desktops
b. ARM-based tablets
c. laptops
d. servers
A, C, and D
Advanced RISC Machines (ARM) and x86 are common architectures. The x86 architecture dominates desktops, laptops, and server computers, while the ARM architecture dominates smartphones, tablets, and single-board computers.
Data loss prevention (DLP) systems detect and prevent users from storing information on unauthorized systems or transmitting information over unauthorized networks. Which of the following are examples of DLP systems an organization can set for users? (Select the three best options.)
a. enforce the use of external media
b. implement clipboard privacy controls
c. use print blocking
d. restrict virtual desktop infrastructure (VDI) implementation
B, C, and D
After provisioning a server, a support technician conducts system hardening. Why is system hardening such a vital practice? (Select the three best options.)
a. system hardening eliminates monitoring software
b. system hardening reduces the attack surface of a system
c. system hardening includes disabling unnecessary services
d. system hardening involves patching the operating system
B, C, and D
A support manager is deploying multifactor authentication (MFA) in a corporate office. What is true of MFA? (Select the three best options.)
a. using at least two of the three factors of authentication is called multifactor authentication (MFA)
b. MFA can use multiple authentication factors combined with authentication attributes
c. when using MFA, abusing authentication becomes far more simplified
d. with MFA in place, a username and password can be breached but are unusable without the additional factor
A, B, and D
A systems administrator is developing a plan for deploying Zero Trust architecture throughout the enterprise. What components of Zero Trust architecture should the administrator consider essential? (Select the three best options.)
a. increased granularity
b. network and endpoint security
c. identity and access mgmt (IAM)
d. network segmentation
B, C, and D
A security engineer wants to implement Zero Trust architecture at their workplace. What key benefits would the engineer mention to their company for using a Zero Trust architecture? (Select the three best options.)
a. greater security
b. better access controls
c. improved governance and compliance
d. decreased granularity
A, B, and C
A support technician examines the Windows registry for a host on a local area network (LAN). The technician uses which subkey to find username information for accounts used on a computer?
a. SAM
b. SECURITY
c. DEFAULT
d. SYSTEM
a. SAM
The Windows registry is a database for storing operating system, device, and software application configuration information. The support technician can use the Security Accounts Manager (SAM), which stores username information for accounts on the current computer.
A systems administrator installs a syslog server to capture and report events for wireless infrastructure. Following a requirement from the Chief Information Officer (CIO), recorded logging levels should include a status if an access point is unusable and if any immediate action is required. Which logging levels does the administrator evaluate and configure? (Select the two best options.)
a. 2-criitical
b. 4-warning
c. 0-emergency
d. 1-alert
C and D
A network engineer wants to simplify network and security services. How could Secure Access Service Edge (SASE) help to simplify these services for the engineer?
a. it combines network and security functions into a single cloud-hosted service
b. it requires dedicated hardware
c. it offers elementary features
d. it blocks the remote mgmt of networks and systems
A
Secure Access Service Edge (SASE) aims to simplify the complexity of managing multiple network and security services by combining networking and security functions into a single cloud-hosted service.
A system technician reviews system logs from various devices and notices discrepancies between recorded events. The events between the systems are not synchronizing in the correct order. Which configuration should the technician analyze and adjust to ensure proper and accurate logging? (Select the two best options.)
a. NTP
b. GPS
c. PKI
d. SSL
A and B
An organization looks to utilize an approach with minimal human engagement in security scanning and reporting. What actions does the organization put in place to achieve this goal? (Select the three best options.)
a. effective communication
b. trigger actions
c. application integration
d. data enrichment
B, C, and D
A new software development organization looks to provide a security solution for an existing security product. In doing so, developers at the organization utilize which technology from the existing product’s toolkit to provide an integrated solution?
a. SOAR
b. SOC
c. SIEM
d. API
d. API
An application programming interface (API) is a set of functions and procedures that allow two or more applications to integrate. Developers can use the existing product’s toolkit for integration.
An organization looks to strengthen team coordination in a security operations center (SOC) without needing to rely on self-operating support. In doing so, which policies should management implement for team members to achieve this goal? (Select the three best options.)
a. information sharing
b. streamlined automation
c. communication protocols
d. effective collaboration
A, C, and D