Package deal
CySA+ Bundled Exams with complete solutions
CySA+ Bundled Exams with complete solutions
[Show more]CySA+ Bundled Exams with complete solutions
[Show more]After running an nmap scab of a system, you receive scan data that indicates the following ports are 
open: 
22/tcp 
443/tcp 
1521/tcp 
What services commonly run on these ports? 
A. SMTP, NetBIOS, MySQL 
B. SSH, Microsoft DS, WINS 
C.SSH, HTTPS, Oracle 
D.FTP, HTTPS, MS-SQL - C. SSH, HTTPS, Oracle ...
Preview 2 out of 12 pages
Add to cartAfter running an nmap scab of a system, you receive scan data that indicates the following ports are 
open: 
22/tcp 
443/tcp 
1521/tcp 
What services commonly run on these ports? 
A. SMTP, NetBIOS, MySQL 
B. SSH, Microsoft DS, WINS 
C.SSH, HTTPS, Oracle 
D.FTP, HTTPS, MS-SQL - C. SSH, HTTPS, Oracle ...
Despite operating a patch management program, your company has been exposed to several attacks 
over the last few months. You have drafted a policy to require a lessons-learned incident report be 
created to review the historical attacks and to make this analysis a requirement following future attac...
Preview 2 out of 11 pages
Add to cartDespite operating a patch management program, your company has been exposed to several attacks 
over the last few months. You have drafted a policy to require a lessons-learned incident report be 
created to review the historical attacks and to make this analysis a requirement following future attac...
An analyst needs to forensically examine a Windows machine that was compromised by a threat actor. 
Intelligence reports state this specific threat actor is characterized by hiding malicious artifacts, 
especially with 
alternate data streams. Based on this intelligence, which of the following BEST ...
Preview 4 out of 69 pages
Add to cartAn analyst needs to forensically examine a Windows machine that was compromised by a threat actor. 
Intelligence reports state this specific threat actor is characterized by hiding malicious artifacts, 
especially with 
alternate data streams. Based on this intelligence, which of the following BEST ...
Confidentiality, integrity, and availability - What are the three key objectives of information 
security? 
Threats and vulnerabilities. - Risk exists at the intersection of _______ and _________. 
Network access control - What type of system controls access to a network based on criteria such 
as t...
Preview 2 out of 10 pages
Add to cartConfidentiality, integrity, and availability - What are the three key objectives of information 
security? 
Threats and vulnerabilities. - Risk exists at the intersection of _______ and _________. 
Network access control - What type of system controls access to a network based on criteria such 
as t...
DNS Sinkhole - Provide a response to a DNS query that does not resolve the IP address.. 
Instead targets the addresses for known malicious domains 
Role-Based access control (RBAC) - grants permissions based on a user's role or group. 
Reverse Engineering - the process of decontructing something in...
Preview 2 out of 14 pages
Add to cartDNS Sinkhole - Provide a response to a DNS query that does not resolve the IP address.. 
Instead targets the addresses for known malicious domains 
Role-Based access control (RBAC) - grants permissions based on a user's role or group. 
Reverse Engineering - the process of decontructing something in...
First step in the NIST cybersecurity risk assessment process? - Identify threats 
What type of threat would a failure of the power grid be? - Environmental 
Are penetration tests considered an operational security control? - Yes 
What risk management strategy is used when implementing a firewall to ...
Preview 1 out of 3 pages
Add to cartFirst step in the NIST cybersecurity risk assessment process? - Identify threats 
What type of threat would a failure of the power grid be? - Environmental 
Are penetration tests considered an operational security control? - Yes 
What risk management strategy is used when implementing a firewall to ...
A cybersecurity analyst receives a phone call from an unknown person with the number blocked on the 
caller ID. After starting conversation, the caller begins to request sensitive information. Which of the 
following techniques is being applied? 
A. Social engineering 
B. Phishing 
C. Impersonation ...
Preview 3 out of 25 pages
Add to cartA cybersecurity analyst receives a phone call from an unknown person with the number blocked on the 
caller ID. After starting conversation, the caller begins to request sensitive information. Which of the 
following techniques is being applied? 
A. Social engineering 
B. Phishing 
C. Impersonation ...
Which one of the following objectives is not one of the three main objectives that information security 
professionals must achieve to protect their organizations against cybersecurity threats? - 
nonrepudiation 
Tommy is assessing the security database servers in his datacenter and realizes that on...
Preview 4 out of 58 pages
Add to cartWhich one of the following objectives is not one of the three main objectives that information security 
professionals must achieve to protect their organizations against cybersecurity threats? - 
nonrepudiation 
Tommy is assessing the security database servers in his datacenter and realizes that on...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller PatrickKaylian. Stuvia facilitates payment to the seller.
No, you only buy these notes for $18.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
75632 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now