All Posts

ComptiA CySA+ 2023 Questions and answer - Part 20

Mary Mary Smith
03 Mar 2023
3 min
0

1. A company wants to update its acceptable use policy (AUP) to ensure it relates to the newly implemented password standard, which requires sponsoredauthentication of guest wireless devices. Which of the following is MOST likely to be incorporated in the AUP?

A) Sponsored guest passwords must be at least ten characters in length and contain a symbol.
B) Guests using the wireless network should provide valid identification when registering their wireless devices.
C) The corporate network should have a wireless infrastructure that uses open authentication standards.
D) The network should authenticate all guest users using 802.1x backed by a RADIUS or LDAP server.



2. A cybersecurity analyst is hired to review the security posture of a company. The cybersecurity analyst notices a very high network bandwidth consumption due toSYN floods from a small number of IP addresses.Which of the following would be the BEST action to take to support incident response?

A) Increase the companys bandwidth.
B) Block all SYN packets.
C) Apply ingress filters at the routers.
D) Install a packet capturing tool.



3. A security audit revealed that port 389 has been used instead of 636 when connecting to LDAP for the authentication of users. The remediation recommended bythe audit was to switch the port to 636 wherever technically possible. Which of the following is the BEST response?

A) Correct the audit. This finding is accurate, but the correct remediation is to update encryption keys on each of the servers to match port 636.
B) Change all devices and servers that support it to 636, as encrypted services run by default on 636.
C) Change all devices and servers that support it to 636, as 389 is a reserved port that requires root access and can expose the server to privilege escalationattacks.
D) Correct the audit. This finding is a well-known false positive, the services that typically run on 389 and 636 are identical.



4. A company invested ten percent of its entire annual budget in security technologies. The Chief Information Officer (CIO) is convinced that, without this investment,the company will risk being the next victim of the same cyber attack its competitor experienced three months ago. However, despite this investment, users aresharing their usernames and passwords with their coworkers to get their jobs done. Which of the following will eliminate the risk introduced by this practice?

A) Send an email asking users not to share their credentials
B) Run a report on all users sharing their credentials and alert their managers of further actions
C) Force a daily password change
D) Invest in and implement a solution to ensure non-repudiation



5. A malicious user is reviewing the following output:root:~#ping 192.168.1.13764 bytes from 192.168.2.1 icmp_seq=1 ttl=63 time=1.58 ms64 bytes from 192.168.2.1 icmp_seq=2 ttl=63 time=1.45 msroot: ~#Based on the above output, which of the following is the device between the malicious user and the target?

A) Hub
B) Proxy
C) Access point
D) Switch



1. Right Answer: B
Explanation:

2. Right Answer: C
Explanation:

3. Right Answer: B
Explanation:

4. Right Answer: A
Explanation:

5. Right Answer: B
Explanation:

0 Comments
Leave a comment