• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

Ciampa CompTIA CySA Plus Guide to Cybersecurity Analyst 1e Mindtap

EXAMS AND CERTIFICATIONS May 10, 2024
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

Ciampa CompTIA CySA Plus Guide to Cybersecurity Analyst 1e Mindtap

Ciampa CompTIA CySA Plus Guide to

Cybersecurity Analyst 1e Mindtap

Which of the following is not a position for which the CompTIA CySA+ certification is designed?

a. Firewall analyst

b. Vulnerability analyst

c. Threat intelligence analyst

d. Security analyst ✔✔Firewall analyst

Alyona has been asked by her supervisor to be part of an internal group that will perform an

environmental reconnaissance. Which of the following activities would Alyona not be performing?

a. Probe a competitor's site for weaknesses.

b. Gather information through active and passive techniques.

c. Uncover weaknesses in the organization's cyber defense.

d. Attempt to determine what information a threat actor can gather. ✔✔Probe a competitor's site

for weaknesses.

Tatyana is compiling a list of company employees who may be targeted for user reconnaissance.

Which of the following employees would most likely not be a primary target?

a. Secretary of the president

b. Chief financial officer

c. System administrator

d. Network administrator ✔✔a. Secretary of the president

Which of the following statements about social media profiling is true?

a. Social media profiling is considered to be unethical.

b. People search engines can assist when conducting social media profiling.

c. A profile only includes employment information and does not include personal information such

as family connections, hobbies, and interests.

d. Social media profiling is rarely used due to the security protections built into modern social

media sites. ✔✔b. People search engines can assist when conducting social media profiling.

Which of the following is not a goal of network reconnaissance?

a. Topology discovery

b. Threat actor identification

c. Service discovery

d. Operating system fingerprinting ✔✔b. Threat actor identification

A threat actor who is attempting to uncover the layout of an internal network is performing which

of the following?

a. Site identification

b. Topology discovery

c. Network investigation

d. Packet analysis ✔✔b. Topology discovery

Which of the following is not a reason that a threat actor might have difficulty capturing packets?

a. She would need access to the network, which requires access within a protected building.

b. Packets behave differently once they have left the network.

c. Bypassing network authentication and access control can be difficult.

d. Once the threat actor connects to a network, the connection may become immediately apparent.

✔✔b. Packets behave differently once they have left the network.

What is the basic unit of information in a DNS zone file that is used to resolve DNS queries?

a. Query table

b. Resource record (RR)

c. DNS data field

d. Resolution field ✔✔b. Resource record (RR)

Which DNS record type is used to resolve an IPv6 host address?

Download Study Material

Buy This Study Material

$12.00
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: EXAMS AND CERTIFICATIONS
Description:

Ciampa CompTIA CySA Plus Guide to Cybersecurity Analyst 1e Mindtap

UNLOCK ACCESS $12.00