Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA CySA+ 2023 Questions and answer - Part 63

Mary Smith

Mon, 20 Apr 2026

ComptiA CySA+ 2023 Questions and answer - Part 63

1. An organization uses Common Vulnerability Scoring System (CVSS) scores to prioritize remediation of vulnerabilities.Management wants to modify the priorities based on a difficulty factor so that vulnerabilities with lower CVSS scores may get a higher priority if they are easier toimplement with less risk to system functionality. Management also wants to quantify the priority. Which of the following would achieve managements objective?

A) ((CVSS Score) * 2) / Difficulty = Priority Where CVSS Score is weighted and Difficulty is a range from 1 to 5 with 5 being easiest and lowest risk to implement
B) (CVSS Score) * Difficulty = Priority Where Difficulty is a range from 0.1 to 1.0 with 1.0 being easiest and lowest risk to implement
C) (CVSS Score) / Difficulty = Priority Where Difficulty is a range from 1 to 10 with 10 being easiest and lowest risk to implement
D) (CVSS Score) * Difficulty = Priority Where Difficulty is a range from 1 to 5 with 1 being easiest and lowest risk to implement



2. Several users have reported that when attempting to save documents in team folders, the following message is received:The File Cannot Be Copied or Moved Service Unavailable.Upon further investigation, it is found that the syslog server is not obtaining log events from the file server to which the users are attempting to copy files. Which ofthe following is the MOST likely scenario causing these issues?

A) The file server is experiencing high CPU and memory utilization
B) The network is saturated, causing network congestion
C) All the available space on the file server is consumed
D) Malicious processes are running on the file server



3. A security analyst has created an image of a drive from an incident. Which of the following describes what the analyst should do NEXT?

A) The analyst should begin analyzing the image and begin to report findings.
B) The analyst should create a hash of the image and compare it to the original drives hash.
C) The analyst should create a chain of custody document and notify stakeholders.
D) The analyst should create a backup of the drive and then hash the drive.



4. An organization is experiencing degradation of critical services and availability of critical external resources. Which of the following can be used to investigate theissue?

A) Vulnerability analysis
B) Behavioral analysis
C) Netflow analysis
D) Risk analysis



5. A database administrator contacts a security administrator to request firewall changes for a connection to a new internal application.The security administrator notices that the new application uses a port typically monopolized by a virus.The security administrator denies the request and suggests a new port or service be used to complete the applications task.Which of the following is the security administrator practicing in this example?

A) Port security
B) Explicit deny
C) Access control lists
D) Implicit deny



1. Right Answer: C
Explanation:

2. Right Answer: B
Explanation:

3. Right Answer: B
Explanation:

4. Right Answer: C
Explanation:

5. Right Answer: C
Explanation:

0 Comments

Leave a comment