Information Technology > QUESTIONS & ANSWERS > CompTIA Cyber security Analyst (CySA+) Assessment Test Already Passed (All)
CompTIA Cyber security Analyst (CySA+) Assessment Test Already Passed After running an nmap scan of a system, you receive scan data that indicates the following three ports are open:22/TCP443/TCP1... 521/TCP What services commonly run on these ports? A.SMTP, NetBIOS, MySQL B.SSH, Microsoft DS, WINS C.SSH, HTTPS, Oracle D.FTP, HTTPS, MS-SQL ✔✔C. These three TCP ports are associated with SSH (22), HTTPS (443), and Oracle databases (1521). Other ports mentioned in the potential answers are SMTP (25), NetBIOS (137-139), MySQL (3306), WINS (1512), FTP (20 and 21), and MS-SQL (1433/1434). Which of the following tools is best suited to querying data provided by organizations like the American Registry for Internet Numbers (ARIN) as part of a footprinting or reconnaissance exercise? A.nmap B.traceroute C.regmon D.whois ✔✔D. Regional Internet registries like ARIN are best queried either via their websites or using tools like Whois. Nmap is a useful port scanning utility, traceroute is used for testing the path packets take to a remote system, and regmon is an outdated Windows Registry tool that has been supplanted by Process Monitor. What type of system allows attackers to believe they have succeeded with their attack, thus providing defenders with information about their attack methods and tools? A.A honeypot B.A sinkhole C.A crackpot D.A darknet ✔✔A. Honeypots are systems that are designed to look like attractive targets. When they are attacked, they simulate a compromise, providing defenders with a chance to see how attackers operate and what tools they use. DNS sinkholes provide false information to malicious software, redirecting queries about command and control systems to allow remediation. Darknets are segments of unused network space that are monitored to detect traffic—since legitimate traffic should never be aimed at the darknet, this can be used to detect attacks and other unwanted traffic. Crackpots are eccentric people—not a system you'll run into on a network. What cybersecurity objective could be achieved by running your organization's web servers in redundant, geographically separate datacenters? A.Confidentiality B.Integrity C.Immutability D.Availability ✔✔D. Redundant systems, particularly when run in multiple locations and with other protections to ensure uptime, can help provide availability. Which of the following vulnerability scanning methods will provide the most accurate detail during a scan? A.Black box B.Authenticated C.Internal view D.External view ✔✔B. An authenticated, or credentialed, scan provides the most detailed view of the system. Black-box assessments presum [Show More]
Last updated: 1 year ago
Preview 1 out of 9 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Add to cartInstant download
We Accept:
Connected school, study & course
About the document
Uploaded On
Sep 02, 2022
Number of pages
9
Written in
This document has been written for:
Uploaded
Sep 02, 2022
Downloads
0
Views
73
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·