A company has the following security requirements:
. No public IPs
* All data secured at rest
. No insecure ports/protocols
After a cloud scan is completed, a security analyst receives reports that several misconfigurations are putting the company at risk. Given the following cloud scanner output:
Which of the following should the analyst recommend be updated first to meet the security requirements and reduce risks?
This VM has a public IP and an open port 80, which violates the company's security requirements of no public IPs and no insecure ports/protocols. It also exposes the VM to potential attacks from the internet. This VM should be updated first to use a private IP and close the port 80, or use a secure protocol such as HTTPS.
Reference[CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition], Chapter 2: Cloud and Hybrid Environments, page 67.[What is a Public IP Address?][What is Port 80?]
A cybersecurity analyst notices unusual network scanning activity coming from a country that the company does not do business with. Which of the following is the best mitigation technique?
Geoblocking is the best mitigation technique for unusual network scanning activity coming from a country that the company does not do business with, as it can prevent any potential attacks or data breaches from that country. Geoblocking is the practice of restricting access to websites or services based on geographic location, usually by blocking IP addresses associated with a certain country or region. Geoblocking can help reduce the overall attack surface and protect against malicious actors who may be trying to exploit vulnerabilities or steal information. The other options are not as effective as geoblocking, as they may not block all the possible sources of the scanning activity, or they may not address the root cause of the problem. Official Reference:
https://www.blumira.com/geoblocking/
https://www.avg.com/en/signal/geo-blocking
Which of the following is a benefit of the Diamond Model of Intrusion Analysis?
The Diamond Model of Intrusion Analysis is a framework that helps analysts to understand the relationships between the adversary, the victim, the infrastructure, and the capability involved in an attack. It also enables analytical pivoting, which is the process of moving from one piece of information to another related one, and identifies knowledge gaps that need further investigation.
A security analyst is improving an organization's vulnerability management program. The analyst cross-checks the current reports with the system's infrastructure teams, but the reports do not accurately reflect the current patching levels. Which of the following will most likely correct the report errors?
Credentialed vulnerability scans allow the scanner to log into systems and retrieve accurate information about installed patches and configurations. If the reports do not reflect current patching levels, it is likely that the scan is being performed without credentials, leading to incomplete or inaccurate results.
Option A (Updating the scanning engine) ensures the tool has the latest detection capabilities but does not directly affect scan accuracy for missing patches.
Option B (Centralized patching) helps maintain consistency but does not correct reporting errors.
Option D (Resetting plug-ins) may be useful if plug-ins are outdated, but the primary issue is lack of privileged access during scanning.
Thus, C is the correct answer, as credentialed scans provide more accurate vulnerability assessments.
A security analyst reviews a SIEM alert related to a suspicious email and wants to verify the authenticity of the message:
SPF = PASS
DKIM = FAIL
DMARC = FAIL
Which of the following did the analyst most likely discover?
Comprehensive and Detailed Step-by-Step The SPF = PASS result confirms the email came from an authorized server, but DKIM = FAIL indicates the message was not properly signed with the expected DomainKeys Identified Mail (DKIM) signature. DMARC = FAIL suggests that because DKIM failed, the overall email authentication failed. This scenario is consistent with a legitimate server sending an unsigned email.
CompTIA CySA+ All-in-One Guide (Chapter 5: Email Analysis)
CompTIA CySA+ Practice Tests (Domain 1.3 Email Authentication)
Ma
30 minutes agoLashon
11 days agoSamira
25 days agoJoanna
28 days agoDelfina
2 months agoBilli
3 months agoRex
3 months agoKris
3 months agoDomitila
4 months agoJamal
4 months agoVivan
4 months agoMartina
5 months agoWerner
5 months agoLynelle
5 months agoMichal
6 months agoDesiree
6 months agoAnnamae
6 months agoValda
6 months agoMarshall
7 months agoKatheryn
7 months agoStanford
7 months agoLaurel
7 months agoPortia
7 months agoErin
7 months agoTamala
8 months agoEdison
8 months agoJohnetta
8 months agoCletus
8 months agoTheodora
9 months agoCora
9 months agoWillow
9 months agoRikki
9 months agoMelissa
9 months agoLavonna
10 months agoDerrick
10 months agoCristen
10 months agoHillary
10 months agoCasie
10 months agoArmando
11 months agoAshanti
12 months agoAileen
1 years agoAlberto
1 years agoNovella
1 years agoCarlee
1 years agoCristen
1 years agoBrandon
1 years agofelvaa
1 years agoalexa
1 years agoNathon
1 years agomelvin
1 years agoMark james
1 years agoAmmie
1 years ago