A security analyst is improving an organization's vulnerability management program. The analyst cross-checks the current reports with the system's infrastructure teams, but the reports do not accurately reflect the current patching levels. Which of the following will most likely correct the report errors?
Credentialed vulnerability scans allow the scanner to log into systems and retrieve accurate information about installed patches and configurations. If the reports do not reflect current patching levels, it is likely that the scan is being performed without credentials, leading to incomplete or inaccurate results.
Option A (Updating the scanning engine) ensures the tool has the latest detection capabilities but does not directly affect scan accuracy for missing patches.
Option B (Centralized patching) helps maintain consistency but does not correct reporting errors.
Option D (Resetting plug-ins) may be useful if plug-ins are outdated, but the primary issue is lack of privileged access during scanning.
Thus, C is the correct answer, as credentialed scans provide more accurate vulnerability assessments.
A security analyst reviews a SIEM alert related to a suspicious email and wants to verify the authenticity of the message:
SPF = PASS
DKIM = FAIL
DMARC = FAIL
Which of the following did the analyst most likely discover?
Comprehensive and Detailed Step-by-Step The SPF = PASS result confirms the email came from an authorized server, but DKIM = FAIL indicates the message was not properly signed with the expected DomainKeys Identified Mail (DKIM) signature. DMARC = FAIL suggests that because DKIM failed, the overall email authentication failed. This scenario is consistent with a legitimate server sending an unsigned email.
CompTIA CySA+ All-in-One Guide (Chapter 5: Email Analysis)
CompTIA CySA+ Practice Tests (Domain 1.3 Email Authentication)
A security analyst wants to implement new monitoring controls in order to find abnormal account activity for traveling employees. Which of the following techniques would deliver the expected results?
User behavior analysis (UBA) is the most effective method for detecting abnormal account activity.
UBA uses machine learning and behavioral analytics to identify patterns in how users interact with systems. If an employee suddenly logs in from an unusual location or accesses resources outside of their normal behavior, it raises an alert.
Option A (Malicious command interpretation) is focused on malware analysis, not user behavior.
Option B (Network monitoring) detects anomalies at the network level, but does not specifically focus on user behaviors.
Option D (SSL Inspection) is useful for decrypting encrypted traffic, but it does not analyze user activity patterns.
An analyst is reviewing a vulnerability report and must make recommendations to the executive team. The analyst finds that most systems can be upgraded with a reboot resulting in a single downtime window. However, two of the critical systems cannot be upgraded due to a vendor appliance that the company does not have access to. Which of the following inhibitors to remediation do these systems and associated vulnerabilities best represent?
Proprietary systems are systems that are owned and controlled by a specific vendor or manufacturer, and that use proprietary standards or protocols that are not compatible with other systems. Proprietary systems can pose a challenge for vulnerability management, as they may not allow users to access or modify their configuration, update their software, or patch their vulnerabilities. In this case, two of the critical systems cannot be upgraded due to a vendor appliance that the company does not have access to. This indicates that these systems and associated vulnerabilities are examples of proprietary systems as inhibitors to remediation
An organization is planning to adopt a zero-trust architecture. Which of the following is most aligned with this approach?
Comprehensive and Detailed Step-by-Step
Network segmentation supports zero-trust principles by ensuring sensitive systems are isolated and access is restricted based on identity, role, and context. Unlike traditional models, zero-trust architecture does not automatically trust authenticated users or internal network traffic. It enforces strict access controls to minimize risk.
CompTIA CySA+ Study Guide (Chapter 2: Zero Trust and Network Segmentation, Page 52)
CompTIA CySA+ Objectives (Domain 1.1 - Zero Trust Architecture)
Kris
8 days agoDomitila
14 days agoJamal
22 days agoVivan
1 months agoMartina
1 months agoWerner
2 months agoLynelle
2 months agoMichal
2 months agoDesiree
3 months agoAnnamae
3 months agoValda
3 months agoMarshall
3 months agoKatheryn
3 months agoStanford
4 months agoLaurel
4 months agoPortia
4 months agoErin
4 months agoTamala
4 months agoEdison
5 months agoJohnetta
5 months agoCletus
5 months agoTheodora
5 months agoCora
5 months agoWillow
6 months agoRikki
6 months agoMelissa
6 months agoLavonna
6 months agoDerrick
6 months agoCristen
7 months agoHillary
7 months agoCasie
7 months agoArmando
8 months agoAshanti
9 months agoAileen
9 months agoAlberto
9 months agoNovella
10 months agoCarlee
10 months agoCristen
10 months agoBrandon
10 months agofelvaa
11 months agoalexa
11 months agoNathon
11 months agomelvin
11 months agoMark james
11 months agoAmmie
11 months ago