Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONcysa-v23-101-120

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
cysa-v23-101-120

Description:
cysa-v23-101-120

Author:
AVATAR

Creation Date:
17/05/2023

Category:
Others

Number of questions: 20
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
Which of the following provides an automated approach to checking a system configuration? SCAP CI/CD OVAL Scripting SOAR.
During a company’s most recent incident, a vulnerability in custom software was exploited on an externally facing server by an APT. The lessons-learned report noted the following: • The development team used a new software language that was not supported by the security team's automated assessment tools. • During the deployment, the security assessment team was unfamiliar with the new language and struggled to evaluate the software during advanced testing. Therefore, the vulnerability was not detected. • The current IPS did not have effective signatures and policies in place to detect and prevent runtime attacks on the new application. To allow this new technology to be deployed securely going forward, which of the following will BEST address these findings? (Choose two.) Train the security assessment team to evaluate the new language and verify that best practices for secure coding have been followed Work with the automated assessment-tool vendor to add support for the new language so these vulnerabilities are discovered automatically Contact the human resources department to hire new security team members who are already familiar with the new language Run the software on isolated systems so when they are compromised, the attacker cannot pivot to adjacent systems Instruct only the development team to document the remediation steps for this vulnerability Outsource development and hosting of the applications in the new language to a third-party vendor so the risk is transferred to that provider.
During an incident response procedure, a security analyst collects a hard drive to analyze a possible vector of compromise. There is a Linux swap partition on the hard drive that needs to be checked. Which of the following, should the analyst use to extract human-readable content from the partition? strings head fsstat dd.
As a proactive threat-hunting technique, hunters must develop situational cases based on likely attack scenarios derived from the available threat intelligence information. After forming the basis of the scenario, which of the following may the threat hunter construct to establish a framework for threat assessment? Critical asset list Threat vector Attack profile Hypothesis.
Which of the following types of controls defines placing an ACL on a file folder? Technical control Confidentiality control Managerial control Operational control.
A security analyst is reviewing the following server statistics: Which of the following Is MOST likely occurring? Race condition Privilege escalation Resource exhaustion VM escape.
company's legal and accounting teams have decided it would be more cost-effective to offload the risks of data storage to a third party. The IT management team has decided to implement a cloud model and has asked the security team for recommendations. Which of the following will allow all data to be kept on the third-party network? VDI SaaS CASB FaaS.
An organization wants to consolidate a number of security technologies throughout the organization and standardize a workflow for identifying security issues prioritizing the severity and automating a response Which of the following would best meet the organization's needs'? MaaS SIEM SOAR CI/CD.
A company employee downloads an application from the internet. After the installation, the employee begins experiencing noticeable performance issues, and files are appearing on the desktop. Which of the following processes will the security analyst Identify as the MOST likely indicator of system compromise given the processes running in Task Manager? Chrome.exe Word.exe Explorer.exe mstsc.exe taskmgr.exe.
Which of the following is a difference between SOAR and SCAP? SOAR can be executed faster and with fewer false positives than SCAP because of advanced heuristics SOAR has a wider breadth of capability using orchestration and automation, while SCAP is more limited in scope SOAR is less expensive because process and vulnerability remediation is more automated than what SCAP does SOAR eliminates the need for people to perform remediation, while SCAP relies heavily on security analysts.
After detecting possible malicious external scanning, an internal vulnerability scan was performed, and a critical server was found with an outdated version of JBoss. A legacy application that is running depends on that version of JBoss. Which of the following actions should be taken FIRST to prevent server compromise and business disruption at the same time? Make a backup of the server and update the JBoss server that is running on it. Contact the vendor for the legacy application and request an updated version. Create a proper DMZ for outdated components and segregate the JBoss server. Apply visualization over the server, using the new platform to provide the JBoss service for the legacy application as an external service.
A security engineer is reviewing security products that identify malicious actions by users as part of a company's insider threat program. Which of the following is the most appropriate product category for this purpose? SCAP SOAR UEBA WAF.
A security analyst is reviewing a firewall usage report that contains traffic generated over the last 30 minutes in order to locate unusual traffic patterns: Which of the following source IP addresses does the analyst need to investigate further? 10.18.76.179 10.50.180.49 192.168.48.147 192.168.100.5.
A cybersecurity analyst is concerned about attacks that use advanced evasion techniques. Which of the following would best mitigate such attacks? intre...IPS si PROXY.... Keeping IPS rules up to date Installing a proxy server Applying network segmentation Updating the antivirus software.
An organization wants to implement a privileged access management solution to belter manage the use of emergency and privileged service accounts Which of the following would BEST satisfy the organization's goal? Access control lists Discretionary access controls Policy-based access controls Credential vaulting.
team of network security analysts is examining network traffic to determine if sensitive data was exfiltrated. Upon further investigation, the analysts believe confidential data was compromised. Which of the following capabilities would BEST defend against this type of sensitive data exfiltration? Deploy an edge firewall. Implement DLP Deploy EDR. Encrypt the hard drives.
A manufacturing company uses a third-party service provider lor Tier 1 security support One of the requirements is that the provider must only source talent from its own country due to geopolitical and national security interests Which of the following can the manufacturing company implement to ensure the third-party service provider meets this requirement? Implement a secure supply chain program with governance Implement blacklisting for IP addresses from outside the country Implement strong authentication controls for all contractors Implement user behavior analytics for key staff members.
During a review of the vulnerability scan results on a server, an information security analyst notices the following: The MOST appropriate action for the analyst to recommend to developers is to change the web server so: It only accepts TLSvl 2 It only accepts cipher suites using AES and SHA It no longer accepts the vulnerable cipher suites SSL/TLS is offloaded to a WAF and load balancer.
The Chief information Officer of a large cloud software vendor reports that many employees are falling victim to phishing emails because they appear to come from other employees. Which of the following would BEST prevent this issue Induce digital signatures on messages originating within the company. Require users authenticate to the SMTP server Implement DKIM to perform authentication that will prevent this Issue. Set up an email analysis solution that looks for known malicious Iinks within the email.
An IT security analyst has received an email alert regarding vulnerability within the new fleet of vehicles the company recently purchased. Which of the following attack vectors is the vulnerability MOST likely targeting? SCADA CAN bus Modbus loT.
Report abuse Consent Terms of use