All Posts

ComptiA CySA+ 2023 Questions and answer - Part 16

Mary Mary Smith
03 Mar 2023
2 min
0

1. Using a heuristic system to detect an anomaly in a computers baseline, a system administrator was able to detect an attack even though the company signaturebased IDS and antivirus did not detect it. Further analysis revealed that the attacker had downloaded an executable file onto the company PC from the USB port,and executed it to trigger a privilege escalation flaw. Which of the following attacks has MOST likely occurred?

A) Zero-day
B) XML injection
C) Directory traversal
D) Cookie stealing



2. The new Chief Technology Officer (CTO) is seeking recommendations for network monitoring services for the local intranet. The CTO would like the capability tomonitor all traffic to and from the gateway, as well as the capability to block certain content. Which of the following recommendations would meet the needs of theorganization?

A) Recommend setup of IP filtering on both the internal and external interfaces of the gateway router.
B) Recommend installation of a firewall on the internal interface and a NIDS on the external interface of the gateway router.
C) Recommend installation of an IPS on both the internal and external interfaces of the gateway router.
D) Recommend installation of an IDS on the internal interface and a firewall on the external interface of the gateway router.



3. As part of the SDLC, software developers are testing the security of a new web application by inputting large amounts of random data. Which of the following typesof testing is being performed?

A) Regression testing
B) Stress testing
C) Input validation
D) Fuzzing



4. Various devices are connecting and authenticating to a single evil twin within the network. Which of the following are MOST likely being targeted?

A) All endpoints
B) Wired SCADA devices
C) VPNs
D) Network infrastructure
E) Mobile devices


5. Nmap scan results on a set of IP addresses returned one or more lines beginning with cpe:/o: followed by a company name, product name, and version. Which ofthe following would this string help an administrator to identify?

A) Operating system
B) Installed software
C) Installed hardware
D) Running services



1. Right Answer: A
Explanation:

2. Right Answer: B
Explanation:

3. Right Answer: D
Explanation:

4. Right Answer: E
Explanation: Reference: http://www.corecom.com/external/livesecurity/eviltwin1.htm

5. Right Answer: A
Explanation:

0 Comments
Leave a comment