CompTIA Cybersecurity Analyst (CySA+) Quiz Questions and Answers
Answer :
Vulnerability
Explanation :
In this scenario, Tommy identified a deficiency in the
security of his web server that renders it vulnerable to attack.
This is a security vulnerability. Tommy has not yet identified a
specific risk because he has not identified a threat (such as a
hacker) that might exploit this vulnerability.
Whitelisting software prevents software that is not on a
preapproved list from being installed. Blacklists prevent specific
software from being installed, whereas heuristic and signature based detection systems focus on behavior and specific
recognizable signatures respectively.
Network access control (NAC) solutions are able to verify
the security status of devices before granting them access to the organization’s network. Devices not meeting minimum security standards may be placed on a quarantine network until they are remediated.
Nmap’s operating system identification flag is –o. This
enables OS detection. –A also enables OS identification and
other features. –osscan with modifiers like –limit and –guess
set specific OS identification features. –os and –id are not nmap flags.
The df command will show you a system’s current disk
utilization. Both the top command and the ps command will
show you information about processes, CPU, and memory
utilization, whereas lsof is a multifunction tool for listing open
files.
Port 23, used by the Telnet protocol, is unencrypted and
insecure. Connections should not be permitted to the jump box
on unencrypted ports. The services running on ports 22 (SSH),
443 (HTTPS), and 3389 (RDP) all use encryption.
In an availability attack, the attacker disrupts access to
information or a service by legitimate users. In this attack, the
attacker disrupted access to the organization’s website, violating
the principle of availabilit
System Center Configuration Manager provides non-real time reporting for disk space. Resmon, perfmon, and SCOM can
all provide real-time reporting, which can help to identify
problems before they take a system down
Traceroute (or tracert on Windows systems) is a
command-line tool that uses ICMP to trace the route that a
packet takes to a host. Whois and nslookup are domain tools,
and routeview is not a command-line tool.
In a proprietary breach, unclassified proprietary
information is accessed or exfiltrated. Protected critical
infrastructure information (PCII) is an example of unclassified
proprietary information.