This appendix contains a full-length practice exam designed to be similar to the CompTIA Cybersecurity Analyst (CySA+) exam. The questions are balanced among the CySA+ domains, and the question content is similar to what you will find on the exam.
Our recommendation is that you save this exam until you have completed your first round of studying and then attempt the exam in a single sitting to simulate the real exam experience.
After grading your exam, you may use it to highlight areas of study that you should revisit before taking the real exam. You will find the answers and explanations to this exam listed in Appendix B.
Good luck with the practice test and best wishes for success on the CySA+ exam!
-oG
-sS
-b
-sV
Insecure, Inc. has experienced multiple data breaches over the past 6 months and has recently hired Cynthia, a new information security officer. Cynthia's first task is to review Insecure, Inc.'s defenses with the goal of identifying appropriate defenses to put in place.
Cynthia knows that her new employers had two major breaches. Breach A occurred when an employee took home a USB external drive with sensitive customer information as well as corporate planning data for the following year. The employee left the drive in their car, and the car was broken into overnight. In the morning, the drive was gone. Insecure, Inc. is uncertain about the fate of the drive and is concerned that customer data as well as their top-secret plans to best their competitors may have been exposed.
Breach B was caused when Insecure, Inc.'s new web application was attacked by unknown attackers who used a SQL injection attack to insert new data into their e-commerce application. Insecure, Inc.'s website was quickly deluged with deal seekers, who put in hundreds of orders for Insecure's newly inexpensive products—the attackers had managed to change the price for almost every product they sold. Insecure, Inc. managed to cancel most of the orders before they shipped, but they have had to deal with angry customers since the event.
Using this information, your task is to help Cynthia recommend the best defensive strategy for each of the following questions.
Which one of the services running on this server can Phil be confident is using encryption?
Of the services listed, which port is most unusual to find on a web server?
nytimes.com
and received the following results:
What is the IP address of the server that answered Kyle's request?
root@demo:~# md5sum image1.raw
441fb68910e08fd0ed2db3bdb4e49233 image1.raw
What task has he performed?
root@demo:~# md5sum -c image1.md5 image1v2.md5
image1.raw: FAILED
md5sum: WARNING: 1 computed checksum did NOT match
image1.raw: OK
He would like to search network traffic to identify connection attempts that might have attempted to exploit this vulnerability. What port would traffic exploiting this vulnerability most likely use?
What technique would be the most effective way to combat this vulnerability?
What technique would be the most effective way to combat this vulnerability?