Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA CySA+ 2023 Questions and answer - Part 9

Mary Smith

Sat, 01 Nov 2025

ComptiA CySA+ 2023 Questions and answer - Part 9

1. A threat intelligence feed has posted an alert stating there is a critical vulnerability in the kernel. Unfortunately, the companys asset inventory is not current. Whichof the following techniques would a cybersecurity analyst perform to find all affected servers within an organization?

A) An OS fingerprinting scan across all hosts
B) A manual log review from data sent to syslog
C) A packet capture of data traversing the server network
D) A service discovery scan on the network



2. An analyst is observing unusual network traffic from a workstation. The workstation is communicating with a known malicious site over an encrypted tunnel. A fullantivirus scan with an updated antivirus signature file does not show any sign of infection. Which of the following has occurred on the workstation?

A) Known malware attack
B) Zero-day attack
C) Cookie stealing
D) Session hijack



3. A university wants to increase the security posture of its network by implementing vulnerability scans of both centrally managed and student/employee laptops. Thesolution should be able to scale, provide minimum false positives and high accuracy of results, and be centrally managed through an enterprise console. Which ofthe following scanning topologies is BEST suited for this environment?

A) An active scanning engine installed on the enterprise console
B) A passive scanning engine located at the core of the network infrastructure
C) A combination of server-based and agent-based scanning engines
D) A combination of cloud-based and server-based scanning engines



4. During an investigation, a computer is being seized. Which of the following is the FIRST step the analyst should take?

A) Power off the computer and remove it from the network.
B) Unplug the network cable and take screenshots of the desktop.
C) Perform a physical hard disk image.
D) Initiate chain-of-custody documentation.



5. Which of the following are essential components within the rules of engagement for a penetration test? (Select TWO).(Select 2answers)

A) Payment terms
B) Authorization
C) Schedule
D) Business justification
E) List of system administrators


1. Right Answer: A
Explanation:

2. Right Answer: B
Explanation:

3. Right Answer: A
Explanation:

4. Right Answer: A
Explanation:

5. Right Answer: B,C
Explanation:

0 Comments

Leave a comment