Test your knowledge of CySA+ topics, Part 4
Over the past few months, we have had 25 questions based on each of the first three domains associated with CompTIA’s CySA+ (Cybersecurity analyst) certification exam. This exam, number CS0-001, consists of 85 questions and must be completed in a 165-minute window.
What follows is a self-test of 25 questions all based on the last of the CySA+ domains, Security Architecture and Tool Sets. The answers appear at the end of the questions. In all cases, pick the best answer(s) to each question. Good luck!
1. Which of the following regulatory compliance acts was superseded by the Federal Information Security Management Act in 2002?
A. Computer Security Acts of 1987
B. Economic Espionage Act of 1996
C. USA PATRIOT ACT of 2001
D. Federal Intelligence Surveillance Acts of 1978
2. Which NIST framework divides controls in three classes: Management, Operational, and Technical?
3. Which ISO standard provides best practice recommendations on information security controls?
4. Which of the following is NOT one of the six layers in the SABSA framework?
5. Which of the following hashes are used by Windows Server and known to be susceptible to a “pass the hash” attack?
6. An Acceptable Use Policy (AUP) would be classified as which of the following types of controls?
7. Which acronym is commonly used with remediation plans?
A. RADIUS (reduce exposure, archive findings, deduct problems, indicate changes, utilize assistance, solve problems)
B. ABC (always be correcting)
C. SMART (specific, measurable, achievable, realistic, time-based)
D. AIDA (attention, interest, desire, action)
8. Which type of SOC (Service Organization Control) report focuses on controls at the organization that would be useful to user entities and their auditors?
A. SOC 0
B. SOC 1
C. SOC 2
D. SOC 3
9. Which of the following is NOT a common example of a directory service in terms of identity management?
C. Active Directory
10. With syslog, which severity level is associated with critical conditions?
11. Which of the following involves an approach to security in which a single hardware- or software-installation provides multiple security function?
12. A Nondisclosure Agreement (NDA) would be classified as which of the following types of controls?
13. Which ISO standard provides guidelines focused on technology readiness for business continuity?
14. While some Linux-based systems store passwords in the /etc/passwd file, it is recommended that they instead be stored in which file?
15. Which of the following standards is LDAP based on?