CompTIA Cybersecurity Analyst (CySA+) Questions

Infosec Train
0

What is CySA+?

CompTIA Cybersecurity Analyst (CySA+) is a certification for IT professionals who use new solutions on devices and networks to prevent, identify, and defeat cybersecurity threats.

CompTIA CySA+ is the only intermediate Cybersecurity Analyst certification that includes both performance-based and multiple-choice questions.

The most common CySA+ questions and answers are listed below. These questions aim to give you details about the CompTIA Cybersecurity Analyst examination.

 


1.      Olivia is thinking about where she could get threat intelligence information that she can use in her protection software. Which of the following outlets is most likely to be free of charge?

A. Vulnerability feeds

B. Open source

C. Closed source

D. Proprietary

 

Answer B. Open source intelligence is content that is publicly accessible that does not require a membership fee. The terms "closed source" and "proprietary intelligence" are similar, and all require fees to the providers. While vulnerability inputs are classified as threat information, they usually require a membership.

 

2.      Cynthia wants to collect information about the target organization's network assets during the reconnaissance stage of a penetration test without triggering an IPS to alert the target to her information gathering. Which of the following options is better for her?

A. Perform a DNS brute-force attack

B. Use a Nmap ping sweep

C. Perform a DNS zone transfer

D. Use a Nmap stealth scan

 

Answer A. A DNS brute-force attack that queries a list of IPs, standard subdomains, or other lists of targets can always circumvent intrusion detection and prevention mechanisms that don't pay attention to DNS queries, although it might seem strange. Cynthia may also be able to locate a DNS server that isn't secured by the IPS of the company! Cynthia should anticipate Nmap scans to be identified because they are more difficult to mask during reconnaissance. Cynthia shouldn't expect to do a zone switch, and if she does, a properly configured IPS should alert.

 

3.      Charles creates and exchanges threat assessments with specific technologists and leaders as part of his threat intelligence program. What stage of the intelligence cycle are we in right now?

A. Dissemination

B. Feedback

C. Collection

D. Requirements

 

Answer A. During the dissemination process of the intelligence cycle, intelligence information is shared with consumers.

 

4.      Fred thinks the malware he's looking at is using a swift flux DNS network, which associates several IP addresses with a single completely eligible domain name and uses multiple download hosts. Based on the NetFlow seen here, how many distinct hosts could he investigate?

Date flow, start, Duration, Proto, Src, IP Addr: Port- Dst IPAddr: Port Packets, Bytes, Flows

2020-07-11 14:39:30.606 0.448 TCP 192.168.2.1:1451- >10.2.3.1:443 10 1510 1

2020-07-11 14:39:30.826 0.448 TCP 10.2.3.1:443- >192.168.2.1:1451 7 360 1

2020-07-11 14:45:32.495 18.492 TCP 10.6.2.4:443->192.168.2.1:1496 5 1107 1

2020-07-11 14:45:32.255 18.888 TCP 192.168.2.1:1496- >10.6.2.4:443 11 1840 1

2020-07-11 14:46:54.983 0.000 TCP 192.168.2.1:1496- >10.6.2.4:443 1 49 1

2020-07-11 16:45:34.764 0.362 TCP 10.6.2.4:443- >192.168.2.1:4292 4 1392 1

2020-07-11 16:45:37.516 0.676 TCP 192.168.2.1:4292- >10.6.2.4:443 4 462 1

2020-07-11 16:46:38.028 0.000 TCP 192.168.2.1:4292- >10.6.2.4:443 2 89 1

2020-07-11 14:45:23.811 0.454 TCP 192.168.2.1:1515- >10.6.2.5:443 4 263 1

2020-07-11 14:45:28.879 1.638 TCP 192.168.2.1:1505- >10.6.2.5:443 18 2932 1

2020-07-11 14:45:29.087 2.288 TCP 10.6.2.5:443- >192.168.2.1:1505 37 48125 1

2020-07-11 14:45:54.027 0.224 TCP 10.6.2.5:443- >192.168.2.1:1515 2 1256 1

2020-07-11 14:45:58.551 4.328 TCP 192.168.2.1:1525- >10.6.2.5:443 10 648 1

2020-07-11 14:45:58.759 0.920 TCP 10.6.2.5:443- >192.168.2.1:1525 12 15792 1

2020-07-11 14:46:32.227 14.796 TCP 192.168.2.1:1525- >10.8.2.5:443 31 1700 1

2020-07-11 14:46:52.983 0.000 TCP 192.168.2.1:1505- >10.8.2.5:443 1 40 1

A. 1

B. 3

C. 4

D. 5

 

Answer C. From 192.168.2.1, four different hosts are accessed in this flow review. 10.2.3.1, 10.6.2.4, 10.6.2.5, and 10.8.2.5 are the addresses.

 

5.      Mia wants to be sure that the architecture of a new ERP program in progress is reviewed by her company's cybersecurity department. Mia should consider the security architecture to be completed during which phase of the SDLC?

A. Analysis and Requirements Definition

B. Design

C. Development

D. Testing and Integration

Answer B. Security architecture and data flow diagram completed during the Design phase.

 

6.      Mika needs to use service discovery and run a Nmap scan that covers all TCP ports. Which of the Nmap commands would she need to run?

A. nmap -p0 -all -SC

B. nmap -p 1-32768 -sVS

C. nmap -p 1-65535 -sV -sS

D. nmap -all -sVS

 

Answer C. Using an SYN scan (-sS) you will scan the entire TCP port range (1-65535) and declare the maximum list of potential ports. The -sV flag is used to allow service version recognition.

 

7.      The following are the results of a port scan performed during a security review. What kind of device has been scanned most probably?

Example of a Nmap scan report (192.168.1.79)

Host is up (1.00s latency)

Not shown: 992 closed ports

PORT            STATE

21/tcp           open

23/tcp          open

80/tcp          open

280/tcp        open

443/tcp        open

515/tcp          open

631/tcp          open

9100/tcp       open

Nmap done: 1 IP address (1 host up) scanned in 124.20 seconds

A. A wireless access point

B. A server

C. A printer

D. A switch

 

Answer C. In the fact that TCP ports 21, 23, 80, and 443 are both commonly used, 515 and 9100 are often associated with printers.

 

8.      Brooke wants to find a technology platform that automates workflows through a range of security technologies, including automatic security incident response. Which tool category best fits this requirement?

A. SIEM

B. NIPS

C. SOAR

D. DLP

 

Answer C. While all of these tools can have some security automation, the aim of a SOAR (security orchestration, automation, and response) platform is to automate security through multiple solutions.

 

9.      What team participates in offensive activities intended to breach security controls during a security exercise?

A. Black team

B. Red team

C. Blue team

D. White team

 

Answer B. The red team is in charge of offensive operations during a security exercise. The blue unit is in charge of defensive activities. The white team was assigned as a referee. There is no such thing as a black team.

 

10.  Which of the following ISO standards advices about how to build and implement information security management systems?

A. ISO 27001

B. ISO 9000

C. ISO 11120

D. ISO 23270


Answer A. Information security management systems are covered by ISO 27001. Quality management is covered by ISO 9000. Gas cylinders are covered by ISO 11120. Programming languages are provided by ISO 23270.

Conclusion

InfosecTrain is a leading provider of IT security training. We provide a complete CompTIA CySA+ certification training program. If you need the help of professionals to pass the CompTIA CySA+ certification exam, check out our CySA+ Certification Training Course. Our course will help you learn how to cover complex persistent threats and how to configure and use threat-detection tools quickly and effectively.


Post a Comment

0Comments

Post a Comment (0)