Free Certification Practice Questions

COMPTIA-CYSA

Loading…
A vulnerability scanner generates the following output:The company has an SLA for patching that requires time frames to be met for high-risk vulnerabilities. Which of the following should the analyst prioritize first for remediation?
#151
A web application team notifies a SOC analyst that there are thousands of HTTP/404 events on the public-facing web server. Which of the following is the next step for the analyst to take?
#152
Which of the following best describes the reporting metric that should be utilized when measuring the degree to which a system application, or user base is affected by an uptime availability outage?
#153
A security analyst needs to provide evidence of regular vulnerability scanning on the company's network for an auditing process. Which of the following is an example of a tool that can produce such evidence?
#154
A security analyst performs a vulnerability scan. Based on the metrics from the scan results, the analyst must prioritize which hosts to patch. The analyst runs the tool and receives the following output:Which of the following hosts should be patched first, based on the metrics?
#155
An organization receives a legal hold request from an attorney. The request pertains to emails related to a disputed vendor contract. Which of the following is the best step for the security team to take to ensure compliance with the request?
#156
A company has the following security requirements:• No public IPs• All data secured at rest• No insecure ports/protocolsAfter a cloud scan is completed a security analyst receives reports that several misconfigurations are putting the company at risk. Given the following cloud scanner output:Which of the following should the analyst recommend be updated first to meet the security requirements and reduce risks?
#157
Which of the following best describes the actions taken by an organization after the resolution of an incident that addresses issues and reflects on the growth opportunities for future incidents?
#158
An analyst is becoming overwhelmed with the number of events that need to be investigated for a timeline. Which of the following should the analyst focus on in order to move the incident forward?
#159
To minimize the impact of a security incident, a cybersecurity analyst has configured audit settings in the organization’s cloud services. Which of the following security controls has the analyst configured?
#160
A web developer reports the following error that appeared on a development server when testing a new application:Which of the following tools can be used to identify the application’s point of failure?
#161
Which of the following describes a contract that is used to define the various levels of maintenance to be provided by an external business vendor in a secure environment?
#162
A security team is concerned about recent Layer 4 DDoS attacks against the company website. Which of the following controls would best mitigate the attacks?
#163
An analyst is reviewing system logs while threat hunting:Which of the following hosts should be investigated first? E. PC5
#164
An organization needs to bring in data collection and aggregation from various endpoints. Which of the following is the best tool to deploy to help analysts gather this data?
#165
A regulated organization experienced a security breach that exposed a list of customer names with corresponding PII data. Which of the following is the best reason for developing the organization's communication plans?
#166
Following an incident, a security analyst needs to create a script for downloading the configuration of all assets from the cloud tenancy. Which of the following authentication methods should the analyst use?
#167
A penetration tester is conducting a test on an organization's software development website. The penetration tester sends the following request to the web interface:Which of the following exploits is most likely being attempted?
#168
A manufacturer has hired a third-party consultant to assess the security of an OT network that includes both fragile and legacy equipment. Which of the following must be considered to ensure the consultant does no harm to operations?
#169
A team of analysts is developing a new internal system that correlates information from a variety of sources, analyzes that information, and then triggers notifications according to company policy. Which of the following technologies was deployed?
#170
Which of following would best mitigate the effects of a new ransomware attack that was not properly stopped by the company antivirus?
#171
A Chief Information Security Officer wants to implement security by design, starting with the implementation of a security scanning method to identify vulnerabilities, including SQL injection, RFI, XSS, etc. Which of the following would most likely meet the requirement?
#172
A security analyst scans a host and generates the following output:Which of the following best describes the output?
#173
The security team at a company, which was a recent target of ransomware, compiled a list of hosts that were identified as impacted and in scope for this incident. Based on the following host list:Which of the following systems was most pivotal to the threat actor in its distribution of the encryption binary via Group Policy? E. HQAdmin9
#174
After a security assessment was done by a third-party consulting firm, the cybersecurity program recommended integrating DLP and CASE to reduce analyst alert fatigue. Which of the following is the best possible outcome that this effort hopes to achieve?
#175
Which of the following threat actors is most likely to target a company due to its questionable environmental policies?
#176
A cybersecurity analyst is recording the following details:• ID• Name• Description• Classification of information• Responsible partyIn which of the following documents is the analyst recording this information?
#177
A SOC manager is establishing a reporting process to manage vulnerabilities. Which of the following would be the best solution to identify potential loss incurred by an issue?
#178
While configuring a SIEM for an organization, a security analyst is having difficulty correlating incidents across different systems. Which of the following should be checked first?
#179
During a scan of a web server in the perimeter network, a vulnerability was identified that could be exploited over port 3389. The web server is protected by a WAF. Which of the following best represents the change to overall risk associated with this vulnerability?
#180