No products in the cart.
CompTIA CySA+ Exam Questions
Page 10 of 53
181.
Acme Inc. has an office near the ocean. The high humidity in the area contributed to a premature server failure that caused a database to go offline for six hours. The threat in this scenario is an example of which of the four threat categories identified by NIST?
-
Structural
-
Adversarial
-
Accidental
-
Environmental
Correct answer: Structural
NIST (The National Institute of Standards and Technology) identifies four categories of threats. They are:
- Adversarial threats that try to intentionally harm an organization
- Accidental threats which can occur when individuals make a mistake
- Structural threats which can occur when equipment, resources, software, or infrastructure fail or are depleted
- Environmental threats that stem from disasters (e.g., hurricanes, fires, or power outages)
While the humidity contributed to the failure, this was not an environmental threat as it did not stem from a disaster. It was a structural threat as a piece of equipment failed.
182.
Kai, a network administrator at Acme Inc., wants to capture all the DNS traffic going from a Windows server to a local network. Kai has administrator access to the Windows server. Which utility should Kai use to capture the DNS traffic?
-
Wireshark
-
strings
-
md5sum
-
ps
Correct answer: Wireshark
Wireshark is a popular network analyzer and packet capture utility that includes a Graphical User Interface (GUI). Wireshark would enable Kai to capture DNS traffic the Windows server is generating.
The strings command is a Linux utility commonly used to extract plaintext data in binary files.
md5sum is a Linux utility that generates MD5 sums based on a file that is provided as input. The output of the command is "<md5 hash value> <file name>", where <md5 hash value> is the MD5 hash and <file name> is the name of the input file.
ps is a Linux utility that provides information on running processes.
183.
Which of the following is an example of a cloud assessment tool?
-
Prowler
-
OWASP
-
John the Ripper
-
Let's Encrypt
Correct answer: Prowler
Scout Suite, Pacu, and Prowler are three popular open-source cloud assessment tools. The CySA+ exam objectives call out these three tools in particular, so CySA+ candidates should be familiar with them.
OWASP is an organization that focuses on web application security.
John the Ripper is a password cracker.
Let's Encrypt is a certificate authority.
184.
Dana, a systems administrator at Acme Inc., is planning to update a database server to address a recently announced CVE that affects the server. Since the update will take the server and associated accounting application offline for four hours, Dana sends an announcement to all affected users notifying them the system will be unavailable from 12:00 p.m. to 4:00 p.m. on Saturday. This announcement is an example of an activity related to what type of action plan?
-
Patching
-
IR communications
-
Awareness, education, and training
-
Compensating controls
Correct answer: Patching
The CySA+ exam objectives call out five types of action plans CySA+ candidates should be familiar with. The table below summarizes each one.
Category | Description | Examples |
Configuration management | Deals with proper configuration, hardening, and creating baseline configurations for systems |
|
Patching | Deals with applying upgrades to systems to address security issues and software bugs |
|
Compensating controls | Involves the use of security controls to address a vulnerability that can not be directly mitigated |
|
Awareness, education, and training | Deals with educating and training staff on cybersecurity practices and principles |
|
Changing business requirements | Modifying business requirements to address a vulnerability |
|
185.
Which of the following is a COMMON use case for Wireshark?
-
Capturing network traffic from a Windows server
-
Extracting plaintext data from a binary file
-
Validating image integrity
-
Listing running processes
Correct answer: Capturing network traffic from a Windows server
Wireshark is a popular network analyzer and packet capture utility that includes a Graphical User Interface (GUI). Capturing network traffic from a server is a common WireShark use case. Other tools would be better suited for the other use cases listed.
The strings command is a Linux utility commonly used to extract plaintext data in binary files.
md5sum is a Linux utility that generates MD5 sums based on a file that is provided as input. The output of the command is "<md5 hash value> <file name>", where <md5 hash value> is the MD5 hash and <file name> is the name of the input file.
ps is a Linux utility that provides information on running processes.
186.
Which of the following BEST describes the differences between static code analysis and dynamic code analysis?
-
Static code analysis runs on source code, dynamic code analysis runs during execution of a program
-
Dynamic code analysis runs on source code, static code analysis runs during execution of a program
-
Both run only on source code
-
Both run only during execution of a program
Correct: Static code analysis runs on source code, dynamic code analysis runs during execution of a program
Static code analysis, also known as source code analysis, analyzes source code for software flaws and cybersecurity issues. Static code analysis can be performed manually or automatically.
Dynamic code analysis analyzes software during the execution of a program and provides various inputs to test how the program responds. Dynamic code analysis can be performed manually or automatically, but automatic analysis is typically preferred due to how much testing is often required for effective analysis.
187.
Which of the following should happen FIRST after an IoC is discovered?
-
Incident responders perform an investigation
-
The CSIRT contain the IoC
-
Incident responders eradicate the IoC
-
A system backup should be created
Correct answer: Incident responders perform an investigation
After an IoC (Indicator of Compromise) is detected, incident responders should determine if there is legitimately an incident or if the IoC is a false positive. If there is legitimately an incident based on responder analysis, an incident is declared.
Recovery and containment come after an incident is declared.
188.
What CVSS score range is associated with critical vulnerabilities?
-
9.0–10.0
-
90–100
-
4–5
-
95–100
Correct answer: 9.0–10.0
CVSS (Common Vulnerability Scoring System) is a standard for quantifying the severity of a vulnerability. CVSS scores use a 0–10.0 scale. 9.0–10.0 is the CVSS score range for critical vulnerabilities. Critical vulnerabilities is a common metric tracked as part of vulnerability management.
189.
A software bug causes Acme Inc.'s webserver to display detailed information about the configuration of the server in an error message. The message is displayed to all users, including unauthenticated users accessing the system over the internet. This is an example of which software development security issue?
-
Improper error handling
-
Dereferencing
-
Race condition
-
Broken authentication
Correct answer: Improper error handling
Improper error handling occurs when an error message reveals information that an end user or attacker should not see. For example, a stack trace may reveal detailed information a threat actor can use to help compromise a system.
Dereferencing typically occurs when an unset value — known as a NULL value — is used in a context where a set value is needed. Typically, this leads to a crash unless the error case is properly handled by the application.
Race conditions are timing-related errors that occur when an application attempts multiple operations at the same time.
Broken authentication refers to improper authentication mechanisms that allow unauthorized users to access information.
190.
Kim, a security engineer at Acme Inc., is reviewing logs to understand recent unusual behavior on the network. During the review, Kim realizes that the network has been breached. This activity BEST aligns with what incident response phase?
-
Detection and analysis
-
Discovery
-
Post-incident activity
-
Enumeration
Correct answer: Detection and analysis
NIST (National Institute for Standards and Technology) SP 800-61 describes a four-phase incident handling process that includes these four phases:
- Preparation - The phase where teams prepare for incident response with training, documentation, procedure creation, planning, testing, and other preparatory steps
- Detection and analysis - The phase dedicated to detecting and identifying threats
- Containment, eradication, and recovery - The phase dedicated to eliminating and recovering from security incidents
- Post-incident activity - The phase dedicated to root cause analysis, lessons learned, and evidence retention
Note that these phases are not "one-and-done" steps and teams will typically cycle through stages and continuously improve.
191.
Kai, a security engineer at Acme Inc., needs to validate the integrity of a file as part of an analysis. Which type of algorithm is BEST for this purpose?
-
SHA1
-
AES
-
DES
-
Blowfish
Correct answer: SHA1
Hashing-algorithms are one-way functions where a given input reliably produces a given output. MD5, SHA1, and SHA2 are common hashing algorithms used to verify image integrity. While MD5 and SHA1 one are not recommended for many cybersecurity use cases, they are still common for validating image integrity.
AES (Advanced Encryption Standard) and DES ( (Data Encryption Standard) are block-ciphers that use symmetric keys and are not typically used as a hash-function. Blowfish is also a block cipher.
192.
A threat actor breached Acme Inc.'s network at 01:00 and installed malware on a server. An anti-malware program on the server detected the malware and alerted the Security Operations Center (SoC) by sending a single email alert at 01:10. A security engineer read the email and began proactively working to contain the malware at 01:15. What was the alert volume for this incident?
-
1
-
5
-
15
-
10
Correct answer: 1
Incident response metrics and KPIs (Key Performance Indicators) CySA+ candidates should be familiar with include:
- Time to detect - The amount of time between an event that triggered an incident occurring and the event being detected
- Time to respond - The time between incident detection and response activity beginning
- Time to remediate - How long it takes to remediate an issue; this metric is typically significantly more complex than time to detect or time to respond and requires more nuanced communications and explanations
- Alert volume - The number of alerts associated with an incident
In this case, there was exactly 1 alert.
193.
Acme Inc. faces the risk of employees stealing spare computer and printer parts from a branch office. Acme Inc. management decides implementing security systems or hiring security guards to prevent office supply theft is too expensive. They decide to do nothing to proactively address this risk. This is an example of which type of risk management strategy?
-
Risk acceptance
-
Risk transference
-
Risk avoidance
-
Risk mitigation
Correct answer: Risk acceptance
There are four standard risk management strategies CySA+ candidates should be familiar with. They are:
- Risk mitigation - The application of security controls to reduce the impact and/or probability of a risk.
- Risk avoidance - The modification of business practices to completely eliminate a risk.
- Risk transference - The shifting of impact to another organization or entity (e.g., via purchasing an insurance policy).
- Risk acceptance - The deliberate choice to accept a risk.
In this example, Acme Inc. management's deliberate choice to "do nothing" is an example of risk acceptance.
194.
The Acme Inc. QA team load tests a web application deployed on a public cloud platform once every month. The testing is typically done during off-peak hours to avoid service disruptions. Due to a misconfiguration in the DevOps pipeline, some of the automated load tests during normal business hours and created significant performance degradation because Acme Inc.'s backbone router could not support all the traffic.
Which type of network issue BEST describes this problem?
-
Bandwidth consumption
-
Beaconing
-
Fuzzing
-
Network loop
Correct answer: Bandwidth consumption
Bandwidth consumption issues occur when a significant amount of network bandwidth is consumed and business functions are disrupted or service outages occur as a result. Common causes of bandwidth consumption issues include malicious activity, misconfigurations, and traffic spikes.
Beaconing is a type of network traffic that enables operators of botnets or other malware that use a command and control model to detect if they have compromised a system, check system status, or perform malicious activity such as running unauthorized commands.
Fuzz testing, also known as fuzzing, is a form of testing where invalid or random data is sent to an application to see how it responds. Fuzz tests are typically automated and useful for uncovering issues like poor error handling and memory leaks.
A network loop is a misconfiguration in network connection that can lead to rapid bandwidth consumption.
195.
A threat actor breached Acme Inc.'s network at 01:00 and installed malware on a server. An anti-malware program on the server detected the malware and alerted the Security Operations Center (SoC) by sending a single email alert at 01:10. A security engineer read the email and began proactively working to contain the malware at 01:15. What was the time to respond for this incident?
-
5 minutes
-
10 minutes
-
15 minutes
-
1 minute
Correct answer: 5 minutes
Incident response metrics and KPIs (Key Performance Indicators) CySA+ candidates should be familiar with include:
- Time to detect - The amount of time between an event that triggered an incident occurring and the event being detected
- Time to respond - The time between incident detection and response activity beginning
- Time to remediate - How long it takes to remediate an issue; this metric is typically significantly more complex than time to detect or time to respond and requires more nuanced communications and explanations
- Alert volume - The number of alerts associated with an incident
The incident was detected at 01:10 and the security engineer began their response 5 minutes later at 01:15.
196.
Acme Inc. is considering the pros and cons of threat intelligence sharing. Which of the following is NOT common use of threat intelligence sharing?
-
For improving confidentiality
-
As a part of monitoring and detection
-
For vulnerability management
-
As a part of risk management
Correct answer: For improving confidentiality
Threat intelligence sharing plays an important role in overall cybersecurity. There are five areas for the use of threat intelligence sharing that CySA+ candidates should be familiar with. They are:
- As a part of incident response
- For vulnerability management
- As a part of risk management
- To inform and influence security engineering
- As a part of monitoring and detection
While threat intelligence sharing may indirectly improve confidentiality by helping an organization learn of new threats or techniques, it is not a direct use like the other answers.
197.
After conducting a lessons learned session, the Acme Inc. security operations team identified four corrective actions the organization should implement. Which component of an incident response report should include details on these corrective actions?
-
Recommendations
-
Evidence
-
Executive summary
-
Timeline
Correct answer: Recommendations
There are several incident response report components CySA+ candidates should be familiar with. The components and their purpose are summarized in the table below.
Report component | Description |
Executive summary | Short description that explains the incident, impact, and current state at a high level |
5W’s | The narrative that describes the who, what, when, where, and why related to the incident |
Recommendations | Typically based on lessons learned activities, this section documents what corrective actions should be performed |
Timeline | The sequence of events associated with an incident. This section can help identify if responses occurred in a timely fashion or not |
Impact assessment | Details on the overall impact an incident had on an organization (e.g., financial or reputational damage) |
Scope | Covers what services, systems, and other aspects of an organization were affected by the incident |
Evidence | Specific data and details from the incident investigation. Evidence may be included as a separate appendix or as part of the report |
198.
Information from what source would be MOST likely indicate that impossible travel may have occurred?
-
Authentication logs
-
DNS logs
-
NTP server
-
ISACs
Correct answer: Authentication logs
Impossible travel is a form of abnormal user activity. Impossible travel occurs when a user is recorded logging in from different geographical locations within a timeframe that would be impossible for a human. In this example, it's not possible for a human to travel from Canada to England in ten minutes. An authentication log would contain this sort of login information.
DNS (Domain Name System) logs would contain information related to DNS lookups.
NTP (Network Time Protocol) servers are used for time synchronization.
ISACs (Information Sharing and Analysis Centers) are organizations that help other organizations share and learn about threat information and can provide helpful cybersecurity tools and assistance.
199.
Dani, a security architect at Acme Inc., is tasked with enumerating all the Acme Inc. devices exposed on the public Internet. What technique is BEST suited for this task?
-
Edge discovery
-
Security controls testing
-
Rainbow tabling
-
Penetration testing
Correct answer: Edge discovery
Attack surface management activities encompass the different actions an organization can take to discover, test, and protect their overall attack surface. Common attack surface management activities include:
- Edge discovery - Scans that identify an organization’s systems that are exposed to the public
- Passive discovery - Techniques that monitor network traffic to detect assets that other scans may miss
- Security controls testing - Tests that verify if existing security controls work as intended
- Penetration testing and adversary emulation - Tests where threat actor behavior is emulated to discover issues in systems and security controls
Rainbow tables are used to check password hashes against a list of known hashes.
200.
How many standard Cisco log levels are there?
-
8
-
7
-
21
-
11
Correct answer: 8
The eight standard Cisco log levels are:
- Level 0- Emergencies
- Level 1- Alerts
- Level 2- Critical
- Level 3- Errors
- Level 4- Warning
- Level 5- Notifications
- Level 6- Information
- Level 7- Debugging
The higher the log level number, the more information is included in the associated logs. Each higher-numbered log level includes the log messages from the lower-numbered levels. For example, Alerts (Level 1) include more log messages than Emergencies (Level 0) because Alerts include Level 1 and Level 0 messages.