Home β€Ί Blog β€Ί CompTIA

ComptiA CySA+ 2023 Questions and answer - Part 24

Mary Mary Smith
03 Mar 2023
2 min read
0 views
0 Comments
2 min read
418 words

1. While preparing for a third-party audit, the vice president of risk management and the vice president of information technology have stipulated that the vendor maynot use offensive software during the audit. This is an example of:

A) risk appetite
B) rules of engagement.
C) service-level agreement.
D) organizational control.



2. A security analyst is performing ongoing scanning and continuous monitoring of the corporate datacenter. Over time, these scans are repeatedly showingsusceptibility to the same vulnerabilities and an increase in new vulnerabilities on a specific group of servers that are clustered to run the same application. Which ofthe following vulnerability management processes should be implemented?

A) Frequent server scanning
B) Regular patch application
C) Group policy modification
D) Automated report generation



3. A company discovers an unauthorized device accessing network resources through one of many network drops in a common area used by visitors.The company decides that it wants to quickly prevent unauthorized devices from accessing the network but policy prevents the company from making changes onevery connecting client.Which of the following should the company implement?

A) Mandatory Access Control
B) Network Intrusion Prevention
C) WPA2
D) Port security



4. A web application has a newly discovered vulnerability in the authentication method used to validate known company users. The user ID of Admin with a passwordof password grants elevated access to the application over the Internet. Which of the following is the BEST method to discover the vulnerability before aproduction deployment?

A) User acceptance testing
B) Manual peer review
C) Stress test the application
D) Input validation



5. An administrator has been investigating the way in which an actor had been exfiltrating confidential data from a web server to a foreign host. After a thoroughforensic review, the administrator determined the servers BIOS had been modified by rootkit installation. After removing the rootkit and flashing the BIOS to aknown good state, which of the following would BEST protect against future adversary access to the BIOS, in case another rootkit is installed?

A) TPM data sealing
B) Host-based IDS
C) File integrity monitoring
D) Anti-malware application



1. Right Answer: B
Explanation:

2. Right Answer: B
Explanation:

3. Right Answer: D
Explanation:

4. Right Answer: D
Explanation:

5. Right Answer: A
Explanation:

Mary
Written by
Comments
0