123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Education >> View Article

Comptia Cybersecurity Analyst (cysa+) Questions

Profile Picture
By Author: infosec train
Total Articles: 33
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

What is CySA+?
CompTIA Cybersecurity Analyst (CySA+) is a certification for IT professionals who use new solutions on devices and networks to prevent, identify, and defeat cybersecurity threats.
CompTIA CySA+ is the only intermediate Cybersecurity Analyst certification that includes both performance-based and multiple-choice questions.
The most common CySA+ questions and answers are listed below. These questions aim to give you details about the CompTIA Cybersecurity Analyst examination.

1. Olivia is thinking about where she could get threat intelligence information that she can use in her protection software. Which of the following outlets is most likely to be free of charge?
A. Vulnerability feeds
B. Open source
C. Closed source
D. Proprietary

Answer B. Open source intelligence is content that is publicly accessible that does not require a membership fee. The terms "closed source" and "proprietary intelligence" are similar, and all require fees to the providers. While vulnerability inputs are classified as threat information, they usually require a membership.

2. Cynthia ...
... wants to collect information about the target organization's network assets during the reconnaissance stage of a penetration test without triggering an IPS to alert the target to her information gathering. Which of the following options is better for her?
A. Perform a DNS brute-force attack
B. Use a Nmap ping sweep
C. Perform a DNS zone transfer
D. Use a Nmap stealth scan

Answer A. A DNS brute-force attack that queries a list of IPs, standard subdomains, or other lists of targets can always circumvent intrusion detection and prevention mechanisms that don't pay attention to DNS queries, although it might seem strange. Cynthia may also be able to locate a DNS server that isn't secured by the IPS of the company! Cynthia should anticipate Nmap scans to be identified because they are more difficult to mask during reconnaissance. Cynthia shouldn't expect to do a zone switch, and if she does, a properly configured IPS should alert.

3. Charles creates and exchanges threat assessments with specific technologists and leaders as part of his threat intelligence program. What stage of the intelligence cycle are we in right now?
A. Dissemination
B. Feedback
C. Collection
D. Requirements

Answer A. During the dissemination process of the intelligence cycle, intelligence information is shared with consumers.

4. Fred thinks the malware he's looking at is using a swift flux DNS network, which associates several IP addresses with a single completely eligible domain name and uses multiple download hosts. Based on the NetFlow seen here, how many distinct hosts could he investigate?
Date flow, start, Duration, Proto, Src, IP Addr: Port- Dst IPAddr: Port Packets, Bytes, Flows
2020-07-11 14:39:30.606 0.448 TCP 192.168.2.1:1451- >10.2.3.1:443 10 1510 1
2020-07-11 14:39:30.826 0.448 TCP 10.2.3.1:443- >192.168.2.1:1451 7 360 1
2020-07-11 14:45:32.495 18.492 TCP 10.6.2.4:443->192.168.2.1:1496 5 1107 1
2020-07-11 14:45:32.255 18.888 TCP 192.168.2.1:1496- >10.6.2.4:443 11 1840 1
2020-07-11 14:46:54.983 0.000 TCP 192.168.2.1:1496- >10.6.2.4:443 1 49 1
2020-07-11 16:45:34.764 0.362 TCP 10.6.2.4:443- >192.168.2.1:4292 4 1392 1
2020-07-11 16:45:37.516 0.676 TCP 192.168.2.1:4292- >10.6.2.4:443 4 462 1
2020-07-11 16:46:38.028 0.000 TCP 192.168.2.1:4292- >10.6.2.4:443 2 89 1
2020-07-11 14:45:23.811 0.454 TCP 192.168.2.1:1515- >10.6.2.5:443 4 263 1
2020-07-11 14:45:28.879 1.638 TCP 192.168.2.1:1505- >10.6.2.5:443 18 2932 1
2020-07-11 14:45:29.087 2.288 TCP 10.6.2.5:443- >192.168.2.1:1505 37 48125 1
2020-07-11 14:45:54.027 0.224 TCP 10.6.2.5:443- >192.168.2.1:1515 2 1256 1
2020-07-11 14:45:58.551 4.328 TCP 192.168.2.1:1525- >10.6.2.5:443 10 648 1
2020-07-11 14:45:58.759 0.920 TCP 10.6.2.5:443- >192.168.2.1:1525 12 15792 1
2020-07-11 14:46:32.227 14.796 TCP 192.168.2.1:1525- >10.8.2.5:443 31 1700 1
2020-07-11 14:46:52.983 0.000 TCP 192.168.2.1:1505- >10.8.2.5:443 1 40 1
A. 1
B. 3
C. 4
D. 5

Answer C. From 192.168.2.1, four different hosts are accessed in this flow review. 10.2.3.1, 10.6.2.4, 10.6.2.5, and 10.8.2.5 are the addresses.

5. Mia wants to be sure that the architecture of a new ERP program in progress is reviewed by her company's cybersecurity department. Mia should consider the security architecture to be completed during which phase of the SDLC?
A. Analysis and Requirements Definition
B. Design
C. Development
D. Testing and Integration
Answer B. Security architecture and data flow diagram completed during the Design phase.

6. Mika needs to use service discovery and run a Nmap scan that covers all TCP ports. Which of the Nmap commands would she need to run?
A. nmap -p0 -all -SC
B. nmap -p 1-32768 -sVS
C. nmap -p 1-65535 -sV -sS
D. nmap -all -sVS

Answer C. Using an SYN scan (-sS) you will scan the entire TCP port range (1-65535) and declare the maximum list of potential ports. The -sV flag is used to allow service version recognition.

7. The following are the results of a port scan performed during a security review. What kind of device has been scanned most probably?
Example of a Nmap scan report (192.168.1.79)
Host is up (1.00s latency)
Not shown: 992 closed ports
PORT STATE
21/tcp open
23/tcp open
80/tcp open
280/tcp open
443/tcp open
515/tcp open
631/tcp open
9100/tcp open
Nmap done: 1 IP address (1 host up) scanned in 124.20 seconds
A. A wireless access point
B. A server
C. A printer
D. A switch

Answer C. In the fact that TCP ports 21, 23, 80, and 443 are both commonly used, 515 and 9100 are often associated with printers.

8. Brooke wants to find a technology platform that automates workflows through a range of security technologies, including automatic security incident response. Which tool category best fits this requirement?
A. SIEM
B. NIPS
C. SOAR
D. DLP

Answer C. While all of these tools can have some security automation, the aim of a SOAR (security orchestration, automation, and response) platform is to automate security through multiple solutions.

9. What team participates in offensive activities intended to breach security controls during a security exercise?
A. Black team
B. Red team
C. Blue team
D. White team

Answer B. The red team is in charge of offensive operations during a security exercise. The blue unit is in charge of defensive activities. The white team was assigned as a referee. There is no such thing as a black team.

10. Which of the following ISO standards advices about how to build and implement information security management systems?
A. ISO 27001
B. ISO 9000
C. ISO 11120
D. ISO 23270
Answer A. Information security management systems are covered by ISO 27001. Quality management is covered by ISO 9000. Gas cylinders are covered by ISO 11120. Programming languages are provided by ISO 23270.
Conclusion
InfosecTrain is a leading provider of IT security training. We provide a complete CompTIA CySA+ certification training program. If you need the help of professionals to pass the CompTIA CySA+ certification exam, check out our CySA+ Certification Training Course. Our course will help you learn how to cover complex persistent threats and how to configure and use threat-detection tools quickly and effectively.

CySA+, Cybersecurity Analyst certification, CompTIA Cybersecurity Analyst examination, CySA+ Certification Training Cou

Total Views: 158Word Count: 1101See All articles From Author

Add Comment

Education Articles

1. Delhi Public School Lava Nagpur
Author: Delhi Public School Lava Nagpur

2. Make Your Child’s First Day Of Nursery Memorable At Bumble Bee Nursery, Sharjah
Author: sharjah

3. Affordable & Trusted Early Education: Explore Bumble Bee Nursery In Sharjah
Author: sharjah

4. Discover One Of The Best Nurseries In Sharjah
Author: sharjah

5. Why Bumble Bee Nursery Is The Best Nursery In Sharjah
Author: sharjah

6. Master Microsoft Office: Complete Ms Office Course For Beginners To Advanced
Author: TCCI - Tririd Computer Coaching Institute

7. Affordable Medical Education With Advanced Facilities And Indian Compatibility
Author: Mbbs Blog

8. Smart Classrooms & Modern Infrastructure: Paving The Way For The Future Of Education In Lucknow
Author: Mount Litera Zee School

9. Dynamics 365 Finance Operations | Online Training Hyderabad
Author: Hari

10. Oracle Integration Cloud Course | Oic Online Training
Author: naveen

11. Best Sailpoint Online Training In 2025 | Visualpath
Author: Pravin

12. Google Cloud Ai Online Training | Top Gcp Ai Institutes In Hyderabad
Author: krishna

13. Unlocking Digital Success With The Best Collaborative Marketing Course By Aima
Author: Aima Courses

14. Start Your Career In Healthcare With Ausbildung Nursing In Germany
Author: aman singh

15. Word Count Explained: How Many Words Is 5 Pages Double Spaced?
Author: Sophia Robart

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: