Wilberforce
On this page, you find all documents, package deals, and flashcards offered by seller wilberforce.
- 271
- 0
- 14
Community
- Followers
- Following
292 items
CYSA EXAM 2023 QUESTIONS AND VERIFIED CORRECT ANSWERS
CYSA EXAM 2023 
QUESTIONS AND 
VERIFIED CORRECT 
ANSWERS 
The IT team reports the EDR software that is installed on laptops is using a large 
amount of resources. Which of the following changes should a security analyst make to 
the EDR to BEST improve performance without compromising security? 
A. Quarantine the infected systems. 
B. Disable on-access scanning. 
C. Whitelist known-good applications. 
D. Sandbox unsigned applications. - ANSWER Whitelist known-good applications 
A security a...
- Exam (elaborations)
- • 19 pages •
CYSA EXAM 2023 
QUESTIONS AND 
VERIFIED CORRECT 
ANSWERS 
The IT team reports the EDR software that is installed on laptops is using a large 
amount of resources. Which of the following changes should a security analyst make to 
the EDR to BEST improve performance without compromising security? 
A. Quarantine the infected systems. 
B. Disable on-access scanning. 
C. Whitelist known-good applications. 
D. Sandbox unsigned applications. - ANSWER Whitelist known-good applications 
A security a...
CYSA EXAM 2023 Questions AND SOLUTIONS
CYSA EXAM 2023 
Questions AND 
SOLUTIONS 
What federal law requires the use of vulnerability scanning on information systems 
operated by federal government agencies? 
A. HIPAA 
B. GLBA 
C. FISMA 
D. FERPA - ANSWER C: FISMA. The Federal Information Security Management Act 
(FISMA) requires that federal agencies implement vulnerability management programs 
for federal information systems. 
Gary is the system administrator for a federal agency and is responsible for a variety of 
information...
- Exam (elaborations)
- • 5 pages •
CYSA EXAM 2023 
Questions AND 
SOLUTIONS 
What federal law requires the use of vulnerability scanning on information systems 
operated by federal government agencies? 
A. HIPAA 
B. GLBA 
C. FISMA 
D. FERPA - ANSWER C: FISMA. The Federal Information Security Management Act 
(FISMA) requires that federal agencies implement vulnerability management programs 
for federal information systems. 
Gary is the system administrator for a federal agency and is responsible for a variety of 
information...
CYSA Exam 2 QUESTION AND CORRECT ANSWERS
CYSA Exam 2 
QUESTION AND 
CORRECT 
ANSWERS 
Ty is reviewing the scan report for a Windows system joined to his organization's 
domain and finds the vulnerability shown here. What should be Ty's most significant 
concern related to this vulnerability? 
Window shows sections for 3 administrator account's password does not expire and 
threat, and options for first detected, last detected, vendor reference, user modified, et 
cetera. 
The presence of this vulnerability indicates that an at...
- Exam (elaborations)
- • 31 pages •
CYSA Exam 2 
QUESTION AND 
CORRECT 
ANSWERS 
Ty is reviewing the scan report for a Windows system joined to his organization's 
domain and finds the vulnerability shown here. What should be Ty's most significant 
concern related to this vulnerability? 
Window shows sections for 3 administrator account's password does not expire and 
threat, and options for first detected, last detected, vendor reference, user modified, et 
cetera. 
The presence of this vulnerability indicates that an at...
CyberArk Defender and Sentry Level 100% CORRECT SOLUTIONS VERIFIED 2023-2023
CyberArk Defender 
and Sentry Level 
100% CORRECT 
SOLUTIONS VERIFIED 
 
__________ Report provides information about all the accounts in the System. - 
ANSWER Privileged Accounts Inventory Report 
__________ Report is for each user and shows Accounts and Safes what they can 
access in the System. - ANSWER Entitlement Report 
File for: 
- main configuration file of the Vault. 
- any change requests requires a restart of the Vault Service. - ANSWER DBP 
PTA Statistics Log Name - ANSWER S 
Wi...
- Package deal
- Exam (elaborations)
- • 21 pages •
CyberArk Defender 
and Sentry Level 
100% CORRECT 
SOLUTIONS VERIFIED 
 
__________ Report provides information about all the accounts in the System. - 
ANSWER Privileged Accounts Inventory Report 
__________ Report is for each user and shows Accounts and Safes what they can 
access in the System. - ANSWER Entitlement Report 
File for: 
- main configuration file of the Vault. 
- any change requests requires a restart of the Vault Service. - ANSWER DBP 
PTA Statistics Log Name - ANSWER S 
Wi...
Cyber Awareness Knowledge Check 2023-2024 Correct Answers 100% Guarantee Pass.
yber Awareness Knowledge 
Check Correct 
Answers 100% Guarantee Pass. 
How many potential insider threat indicators does a person who is married with two 
children, vacations at the beach every year, is pleasant to work with, but sometimes has 
poor work quality display? - correct answers 0 indicators 
What is the best response if you find classified government data on the internet? - 
correct answers Note any identifying information, such as the website's URL, and report 
the situation t...
- Package deal
- Exam (elaborations)
- • 8 pages •
yber Awareness Knowledge 
Check Correct 
Answers 100% Guarantee Pass. 
How many potential insider threat indicators does a person who is married with two 
children, vacations at the beach every year, is pleasant to work with, but sometimes has 
poor work quality display? - correct answers 0 indicators 
What is the best response if you find classified government data on the internet? - 
correct answers Note any identifying information, such as the website's URL, and report 
the situation t...
Cyber Awareness Challenge Knowledge Check 100% Pass.
Cyber Awareness Challenge Knowledge 
Check 100% Pass. 
Which of the following actions is appropriate after finding classified Government 
information on the internet? - ANSWER Note any identifying information and the 
website's URL 
Which of the following may help to prevent inadvertent spillage? - ANSWER Label all 
files, removable media, and subject headers with appropriate classification markings. 
A colleague asks to leave a report containing protected health information (PHI) on his 
...
- Package deal
- Exam (elaborations)
- • 3 pages •
Cyber Awareness Challenge Knowledge 
Check 100% Pass. 
Which of the following actions is appropriate after finding classified Government 
information on the internet? - ANSWER Note any identifying information and the 
website's URL 
Which of the following may help to prevent inadvertent spillage? - ANSWER Label all 
files, removable media, and subject headers with appropriate classification markings. 
A colleague asks to leave a report containing protected health information (PHI) on his 
...
Cyber Awareness Challenge 2023 (Updated)Qustion and Correct answers
Cyber Awareness Challenge 2023 
(Updated)Qustion and Correct answers 
*Spillage 
After reading an online story about a new security project being developed on the 
military installation where you work, your neighbor asks you to comment about the 
article. You know that this project is classified. How should you respond? - ANSWER 
Attempt to change the subject to something non-work related, but neither confirm nor 
deny the article's authenticity 
*Spillage 
Which of the following may help ...
- Package deal
- Exam (elaborations)
- • 22 pages •
Cyber Awareness Challenge 2023 
(Updated)Qustion and Correct answers 
*Spillage 
After reading an online story about a new security project being developed on the 
military installation where you work, your neighbor asks you to comment about the 
article. You know that this project is classified. How should you respond? - ANSWER 
Attempt to change the subject to something non-work related, but neither confirm nor 
deny the article's authenticity 
*Spillage 
Which of the following may help ...
Cyber Awareness Challenge 2022 Knowledge Check
Cyber Awareness Challenge 2022 
Knowledge Check 
*SPILLAGE* 
Which of the following may be helpful to prevent spillage? - CORRECT ANSWER Be 
aware of classification markings and all handling caveats. 
*SPILLAGE* 
Which of the following may be helpful to prevent spillage? - CORRECT ANSWER Label 
all files, removable media, and subject headers with appropriate classification markings. 
* CLASSIFIED DATA* 
Which type of information could reasonably be expected to cause serious damage to 
natio...
- Package deal
- Exam (elaborations)
- • 4 pages •
Cyber Awareness Challenge 2022 
Knowledge Check 
*SPILLAGE* 
Which of the following may be helpful to prevent spillage? - CORRECT ANSWER Be 
aware of classification markings and all handling caveats. 
*SPILLAGE* 
Which of the following may be helpful to prevent spillage? - CORRECT ANSWER Label 
all files, removable media, and subject headers with appropriate classification markings. 
* CLASSIFIED DATA* 
Which type of information could reasonably be expected to cause serious damage to 
natio...
Cyber Awareness 2020 Knowledge Check REVISED 2023/2024 QUESTIONS AND CORRECT ANSWERS
Cyber Awareness 2020 
Knowledge Check 
REVISED 2023/2024 
QUESTIONS AND 
CORRECT ANSWERS. 
How many potential insider threat indicators does a person who is married with two 
children, vacations at the beach every year, is pleasant to work with, but sometimes has 
poor work quality display? - ANSWER 0 indicators 
What is the best response if you find classified government data on the internet? - 
ANSWER Note any identifying information, such as the website's URL, and report the 
situation...
- Package deal
- Exam (elaborations)
- • 8 pages •
Cyber Awareness 2020 
Knowledge Check 
REVISED 2023/2024 
QUESTIONS AND 
CORRECT ANSWERS. 
How many potential insider threat indicators does a person who is married with two 
children, vacations at the beach every year, is pleasant to work with, but sometimes has 
poor work quality display? - ANSWER 0 indicators 
What is the best response if you find classified government data on the internet? - 
ANSWER Note any identifying information, such as the website's URL, and report the 
situation...
Cyber Ark Sentry Final Exam 100% CORRECT SOLUTIONS VERIFIED 2023-2023
Cyber Ark Sentry 
Final Exam 100% 
CORRECT SOLUTIONS 
VERIFIED 
Multiple PVWA servers are always all active - ANSWER true 
Within the Vault each password is encrypted by - ANSWER It own unique key. 
In an SMTP integration it is recommended to use the FQDN when specifying the SMTP 
server address(es) - ANSWER true 
The vault supports a number of dual factor authentication methods. - ANSWER true 
During LDAP/S integration you should specify the FQDN of Domain Controller - 
ANSWER true 
A sta...
- Package deal
- Exam (elaborations)
- • 4 pages •
Cyber Ark Sentry 
Final Exam 100% 
CORRECT SOLUTIONS 
VERIFIED 
Multiple PVWA servers are always all active - ANSWER true 
Within the Vault each password is encrypted by - ANSWER It own unique key. 
In an SMTP integration it is recommended to use the FQDN when specifying the SMTP 
server address(es) - ANSWER true 
The vault supports a number of dual factor authentication methods. - ANSWER true 
During LDAP/S integration you should specify the FQDN of Domain Controller - 
ANSWER true 
A sta...