Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA CySA+ 2023 Questions and answer - Part 59

Mary Smith

Mon, 20 Apr 2026

ComptiA CySA+ 2023 Questions and answer - Part 59

1. Several users have reported that when attempting to save documents in team folders, the following message is received:The File Cannot Be Copied or Moved Service Unavailable.Upon further investigation, it is found that the syslog server is not obtaining log events from the file server to which the users are attempting to copy files. Which ofthe following is the MOST likely scenario causing these issues?

A) The file server is experiencing high CPU and memory utilization
B) The network is saturated, causing network congestion
C) Malicious processes are running on the file server
D) All the available space on the file server is consumed



2. Management is concerned with administrator access from outside the network to a key server in the company. Specifically, firewall rules allow access to the serverfrom anywhere in the company. Which of the following would be an effective solution?

A) Anti-malware
B) Honeypot
C) Jump box
D) Server hardening



3. A recent audit has uncovered several coding errors and a lack of input validation being used on a public portal. Due to the nature of the portal and the severity of theerrors, the portal is unable to be patched. Which of the following tools could be used to reduce the risk of being compromised?

A) Web proxy
B) Network firewall
C) Web application firewall
D) Intrusion prevention system



4. A cybersecurity analyst has identified a new mission-essential function that utilizes a public cloud-based system. The analyst needs to classify the informationprocessed by the system with respect to CIA, Which of the following should provide the CIA classification for the information?

A) The data owner
B) The system administrator
C) The cybersecurity analyst
D) The cloud provider



5. An ATM in a building lobby has been compromised. A security technician has been advised that the ATM must be forensically analyzed by multiple technicians.Which of the following items in a forensic tool kit would likely be used FIRST? (Select TWO).(Select 2answers)

A) Drive adapters
B) Drive imager
C) Write blockers
D) Hashing utilities
E) Crime tape
F) Chain of custody form

1. Right Answer: B
Explanation:

2. Right Answer: C
Explanation:

3. Right Answer: C
Explanation:

4. Right Answer: A
Explanation:

5. Right Answer: C,F
Explanation:

0 Comments

Leave a comment