Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA CySA+ 2023 Questions and answer - Part 41

Mary Smith

Tue, 21 Apr 2026

ComptiA CySA+ 2023 Questions and answer - Part 41

1. Which of the following commands would a security analyst use to make a copy of an image for forensics use?

A) rm
B) dd
C) touch
D) wget



2. Which of the following describes why it is important to include scope within the rules of engagement of a penetration test?

A) To ensure the network segment being tested has been properly secured
B) To ensure all systems being scanned are owned by the company
C) To ensure servers are not impacted and service is not degraded
D) To ensure sensitive hosts are not scanned



3. A security analyst has discovered that an outbound SFTP process is occurring at the same time of day for the past several days. At the time this was discovered,large amounts of business critical data were delivered. The authentication for this process occurred using a service account with proper credentials. The securityanalyst investigated the destination IP for this transfer and discovered that this new process is not documented in the change management log. Which of thefollowing would be the BEST course of action for the analyst to take?

A) Investigate a potential incident.
B) Verify SLA with cloud provider.
C) Run a vulnerability scan.
D) Verify user permissions.



4. The business has been informed of a suspected breach of customer data. The internal audit team, in conjunction with the legal department, has begun working withthe cybersecurity team to validate the report. To which of the following response processes should the business adhere during the investigation?

A) The security analysts should report the suspected breach to regulators when an incident occurs
B) The security analysts should interview system operators and report their findings to the internal auditors
C) The security analysts should not respond to internal audit requests during an active investigation
D) The security analysts should limit communication to trusted parties conducting the investigation



5. A cybersecurity analyst wants to use ICMP ECHO_REQUEST on a machine while using Nmap. Which of the following is the correct command to accomplish this?

A) $ ping --PE 192.168.1.7
B) $ nmap PE 192.168.1.7
C) $ nmap --traceroute 192.168.1.7
D) $ nmap PO 192.168.1.7



1. Right Answer: B
Explanation:

2. Right Answer: B
Explanation:

3. Right Answer: A
Explanation:

4. Right Answer: D
Explanation:

5. Right Answer: B
Explanation:

0 Comments

Leave a comment