100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Test Bank for Ciampa’s CompTIA CySA+ Guide to Cybersecurity Analyst 1st EditionTest Bank for Ciampa’s CompTIA CySA+ Guide to Cybersecurity Analyst 1st EditionTest Bank for Ciampa’s CompTIA CySA+ Guide to Cybersecurity Analyst 1st EditionTest Bank for Ciam $12.99   Add to cart

Exam (elaborations)

Test Bank for Ciampa’s CompTIA CySA+ Guide to Cybersecurity Analyst 1st EditionTest Bank for Ciampa’s CompTIA CySA+ Guide to Cybersecurity Analyst 1st EditionTest Bank for Ciampa’s CompTIA CySA+ Guide to Cybersecurity Analyst 1st EditionTest Bank for Ciam

 35 views  1 purchase
  • Course
  • Institution

Test Bank for Ciampa’s CompTIA CySA+ Guide to Cybersecurity Analyst 1st Edition Multiple Choice 1. Kendra has a very limited budget, but has three critical servers that she needs to secure against data breaches within her company’s infrastructure. She knows that she won’t be able to protec...

[Show more]

Preview 2 out of 10  pages

  • July 21, 2022
  • 10
  • 2021/2022
  • Exam (elaborations)
  • Questions & answers
avatar-seller
Test Bank for Ciampa’s CompTIA CySA+ Guide to
Cybersecurity Analyst 1st Edition Ciampa

, Multiple Choice

1. Kendra has a very limited budget, but has three critical servers that she needs to secure against data breaches within her
company’s infrastructure. She knows that she won’t be able to protect the entire network, but she has started searching for
a solution to secure the most critical assets. Which of the following options would she most likely choose?
a. UTM appliance
b. NIPS
c. Proxy server
d. HIPS
ANSWER: d
FEEDBACK: a. Incorrect. A unified threat management, or UTM, appliance is used to perform antivirus,
spam filtering, and IDS/IPS functions within a single networked device. As such, it
would be useful for an entire network or network segment, not just a few servers.
b. Incorrect.A network intrusion prevention system would meet all of the requirements
listed in the scenario, except that it is network-based.
c. Incorrect.A proxy server can perform certain types of traffic filtering, but it is used at a
network or network segment level and thus does not meet the requirements of the
scenario.
d. Correct. A host intrusion prevention system is installed on individual hosts to detect an
intrusion, log the event, alert administrators, and attempt to stop the intrusion. It is the
only host-based solution described in the answer choices.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 6/17/2020 6:02 AM
DATE MODIFIED: 6/17/2020 6:05 AM

2. Talia has just been hired as the first security employee at an organization. Until this point, security has been everyone’s
responsibility, but she knows that the IT staff have different skill sets and may not be aware of certain weaknesses within
various platforms. Which of the following tools might Talia use to help her determine the state of the existing
infrastructure?
a. NIDS
b. Vulnerability scanner
c. OS fingerprinting
d. syslog
ANSWER: b
FEEDBACK: a. Incorrect. A network intrusion detection system is a good tool to use, but before making
any changes to the infrastructure, it would be a better idea to get an overall status update
and determine where the weakest points are. From there, Talia could determine the best
solutions for resolving any outstanding issues, prioritize which systems are most critical,
and work within a budget to implement the changes.
b. Correct. A vulnerability scanner is a generic term for a range of products that look for
different vulnerabilities, or weaknesses, within networks or systems. A comprehensive
scan of the network and systems would be a good starting point before suggesting or
implementing any new technologies or changes.
c. Incorrect. OS fingerprinting is a type of network scan that determines which operating
system(s) are running. This scan should be incorporated as a part of comprehensive
vulnerability scanning.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller donatrey. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77254 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.99  1x  sold
  • (0)
  Add to cart