CompTIA CySA+ Final Assessment
Which term refers to the way in which a company retains (hires) a forensic examiner to
investigate a case? - ANS-Work product Retention
network tap (test access point) - ANS-A separate device that can be installed between two
network devices, such as a switch, router, or firewall, to monitor traffic.
^ - ANS-When using the upwards caret (^), the match is the start of a line only
(anchor/boundary).
pass-the-hash (PtH) attack - ANS-The process of harvesting an account's cached credentials
when the user logs in to a single sign-on (SSO) system, so the attacker can use the credentials
on other systems.
Golden ticket - ANS-Kerberos ticket that can grant other tickets in an Active Directory
environment. Attackers who can create a golden ticket can use it to grant administrative access
to other domain members, even to domain controllers.
Information technology governance - ANS-concept in which stakeholders ensure that those
responsible for selecting, deploying, and operating IT resources in an enterprise, are performing
their duties in a way that fulfills the enterprise's strategies and interests.
In software development, which process uses comparative measurements and ensures that the
system outcomes are useful? - ANS-Evaluation is a less methodical process aimed at
examining outcomes or literally "proving usefulness." Evaluation is more likely to use
comparative measurements.
An analyst needs to rate a vulnerability as 7.0+ using Common Vulnerability Scoring System
(CVSS) metrics. Which score does the analyst choose? - ANS-With a scan report, each
vulnerability detected will normally be assigned an indicator of severity. A score of high, using
Common Vulnerability Scoring System (CVSS) metrics, is 7.0+.
A network engineer is reviewing a recent vulnerability report from a colleague. The report
conclusively contains many false positives related to hosts that another colleague debunked
recently as non-issues. How can the network engineer manage information in later reports so
that the team focuses on real vulnerabilities and threats? Select all that apply. - ANS-Exclude
hosts, Use exceptions, Change priority
A user oversees a system that processes data for their company throughout the day. The user
also uses the system to mine bitcoin. Which areas is this particular use in conflict with? Select
all that apply. - ANS-Ethics, Code of conduct, Acceptable use policy
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller modockochieng06. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.99. You're not tied to anything after your purchase.