Test Bank For
CompTIA CySA+ Guide to Cybersecurity Analyst CS0-003 3rd Edition 2025 by Mark Ciampa
Chapter 1-12
Chapter 01 Technology Underpinnings
1. An IT professional determines their five servers are operating at only 15 percent of capacity 95 percent of the
time. Which of the following can help improve utilization?
a. Improve the IT infrastructure.
b. Modify the network architecture.
c. Implement virtualization.
d. Use serverless SDN containers.
ANSWER: c
RATIONALE: Virtualization is used to consolidate multiple physical servers into virtual
machines (VMs) that can run on a single physical computer. Because a typical
server uses only about 10 to 15 percent of its capacity, multiple VMs can run on a
single physical server.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network architectures
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network architecture
concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Apply
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM
2. Which of the following is a true statement regarding containerization?
a. It only holds the necessary OS components such as binary files and libraries.
b. It has a small footprint because it cannot share binary files.
c. It has a small footprint because it cannot share libraries.
d. It loads very quickly once the entire OS has been started and is up and running.
ANSWER: a
RATIONALE: With Type I and Type II hypervisors, the entire guest OS must be started and fully
functioning before an application can be launched. A container, on the other hand,
holds only the necessary OS components, such as binary files and libraries, that
are needed for that specific application to run.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network architectures
Page 1
,Name: Class: Date:
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network architecture
concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Remember
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM
3. Damaris works at a company that transitioned away from provisioning, deploying, or managing physical
servers. What type of infrastructure are they most likely using?
a. Serverless because they are no longer using physical servers
b. Containers because physical servers are not needed to run them
c. Serverless infrastructure
d. Wireless infrastructure
ANSWER: c
RATIONALE: A serverless infrastructure is one in which the capacity planning, installation,
setup, and management are invisible to the user because they are handled by
another entity. Serverless means that provisioning, deploying, and managing a
physical server is not performed by the organization. However, physical servers
are used somewhere.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network architectures
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network architecture
concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Remember
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM
4. Which of the following best describes the ability for computing resources to be provisioned and released with
minimal management effort?
a. On-premises computing
b. Network appliances
c. Cloud computing
d. App servers
ANSWER: c
RATIONALE: Cloud computing is a model for enabling on-demand network access to a shared
pool of configurable computing resources that can be rapidly provisioned and
released with minimal management effort or service provider interaction.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
Page 2
,Name: Class: Date:
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network architectures
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network architecture
concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Remember
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM
5. In cloud computing, metered services are used for which of the following purposes?
a. To monitor the performance of cloud resources
b. To keep track of the amount of storage used in the cloud
c. To keep track of the computing resources used for billing
d. To keep track of the traffic flowing into a customer's cloud resources
ANSWER: c
RATIONALE: Metered services employ a pay-per-use model wherein customers only pay for the
cloud computing resources they utilize.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network architectures
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network architecture
concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Remember
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM
6. A company uses IoT devices, a variety of secure database servers, computing devices, and robotic vehicles.
What are the most likely computing locations the company has adopted for these devices? Select two.
a. Edge computing for IoT devices
b. Off-premises for the desktop computers
c. On-prem for database servers
d. Fog computing for IoT devices
e. Cloud computing for robotic vehicles
ANSWER: a, c
RATIONALE: IoT typically uses edge computing. It is at or very near to the source of data
instead of relying on the cloud or on-prem for processing. The database servers
should be on-prem for security.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network architectures
Page 3
, Name: Class: Date:
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network architecture
concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Analyze
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM
7. Which of the following best describes the differences or similarities between a jump server and an air gap?
Select two.
a. A jump server is used in a restricted area of a network called a DMZ.
b. A jump server is used to isolate a network from external sources.
c. An air gap is used in a secure area between the internal and external network.
d. An air gap server should only be accessible by a secure admin workstation.
e. An air gap server should not have USB ports or network interface cards.
ANSWER: a, e
RATIONALE: A jump server is a minimally configured administrator server within a restricted
area of the network called a demilitarized zone (DMZ). It runs only essential
protocols and ports and connects two dissimilar security zones while providing
tightly restricted access between them. To keep a crucial network or endpoint
from being compromised, an air gap can be utilized. This isolates the network or
endpoint from all external sources, including any network connection or external
ports (like a USB port).
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network architectures
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network architecture
concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Analyze
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM
8. A company uses switches wherein the control logic for each switch is bundled with the switching logic. What
are the benefits or challenges presented by this type of network device?
a. It is more secure than the alternative because it has a reduced attack surface.
b. It facilitates automation because the critical elements of the switch are integrated.
c. It lacks the flexibility that allows an administrator to add, drop, or change resources quickly.
d. The company cannot use switches from different vendors because they would be incompatible.
ANSWER: c
RATIONALE: If a VM needs to be migrated, the manager must reconfigure the VLAN on the
switch every time the virtual server is moved. In addition, in a large enterprise,
whenever a new VM is installed, it can take hours for managers to perform the
Page 4
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller solutions. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $18.48. You're not tied to anything after your purchase.