Comptia cybersecurity analyst (cysa+) download pdf






















Packet is the name given to a discrete unit of data in a typical Ethernet network. Wireshark is the most often-used packet sniffer in the world. Like any other packet sniffer, Wireshark does three things:. Packet sniffing can be compared to spelunking — going inside a cave and hiking around. Folks who use Wireshark on a network are kind of like those who use flashlights to see what cool things they can find.

Wireshark has many uses, including troubleshooting networks that have performance issues. Cybersecurity professionals often use Wireshark to trace connections, view the contents of suspect network transactions and identify bursts of network traffic. Wireshark is a safe tool used by government agencies, educational institutions, corporations, small businesses and nonprofits alike to troubleshoot network issues. Additionally, Wireshark can be used as a learning tool.

Those new to information security can use Wireshark as a tool to understand network traffic analysis, how communication takes place when particular protocols are involved and where it goes wrong when certain issues occur.

No tool, no matter how cool, replaces knowledge very well. In other words, to properly use Wireshark, you need to learn exactly how a network operates. On modern networks that use devices called switches, Wireshark or any other standard packet-capturing tool can only sniff traffic between your local computer and the remote system it is talking to. And finally, it is quite easy to spoof IPv4 packets. That requires a bit more know-how on the part of an IT pro, as well as additional software.

The figure below shows an issue on a home network, where the internet connection was very slow. Install, configure, and troubleshoot display devices.

Install and configure peripheral components. Manage system components. Manage data storage. Identify the hardware and software requirements for client environment configurations. Identify network technologies. Install and configure networking capabilities. Support mobile digital devices. Support printers and multifunction devices. Prerequisites None. Recommended Knowledge: Basic knowledge of computer hardware and operating systems 1. You should also have a minimum of 10 years of experience, including at least 5 years of hands-on, technical security experience.

SCAP tool. Debugging utility. Which of the following would be the BEST to use to find vulnerabilities on this server?

Baseline costs plus actual costs. Forecasted costs plus actual costs. Planned costs minus actual costs. Forecasted costs minus actual costs. Which of the following pieces of equipment would be able to handle this requirement?

A VPN concentrator. A load balancer. A wireless controller. Which of the following will BEST achieve this objective? I recommend Lead4Pass to pass the CS exam. Executive management approved the policy and its associated procedures. A simulated breach scenario involving the incident response team B. Completion of annual information security awareness training by all employees C. Tabletop activities involving business continuity team members D.

Completion of lessons-learned documentation by the computer security incident response team E. External and internal penetration testing by a third party Correct Answer: A. Configure DLP to reject all changes to the files without pre-authorization.

Monitor the files for unauthorized changes. Regularly use SHA to hash the directory containing the sensitive information. Place a legal hold on the files. Require authorized users to abide by a strict time context access policy. Use Wireshark to scan all traffic to and from the directory. Correct Answer: A. The analyst wants to ensure malicious applications are not capable of escaping the virtual machines and pivoting to other networks.

Correct Answer: C. The system has not been well maintained and cannot be updated with the rest of the environment Which of the following is the BEST solution? Virtualize the system and decommission the physical machine. Remove it from the network and require air gapping. Only allow access to the system via a jumpbox D. Implement MFA on the specific system. HVAC control systems C. When conducting the scan, the analyst received the following code snippet of results:.

Which of the following describes the output of this scan? The analyst has discovered a False Positive, and the status code is incorrect providing an OK message.

The analyst has discovered a True Positive, and the status code is correct providing a file not found error message. The analyst has discovered a True Positive, and the status code is incorrect providing a forbidden message.

The analyst has discovered a False Positive, and the status code is incorrect providing a server error message. Correct Answer: B. Which of the following is the MOST appropriate next step in the incident response plan? Quarantine the web server B. Deploy virtual firewalls C. Capture a forensic image of the memory and disk D. Enable web server containerization Correct Answer: B. Security regression testing B. Stress testing C. Static analysis testing D. Dynamic analysis testing E.

Asymmatric B. Symmetric C. Homeomorphic D. The hacker then publicly posted stolen internal communications concerning campaign strategies to give the opposition party an advantage. Which of the following BEST describes these threat actors? Semi-authorized hackers. State actors. Script kiddies. Advanced persistent threats.

Which of the following will the researcher MOST likely use to capture this data? A DNS sinkhole. A honeypot.



0コメント

  • 1000 / 1000