100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CYBERSECURITY ANALYST (CSA+) - PRACTICE TEST QUESTIONS WITH CORRECT ANSWERS

Rating
-
Sold
-
Pages
48
Grade
A+
Uploaded on
31-12-2022
Written in
2022/2023

Mark is attempting to evaluate the potential impact of a firewall breach at his company. He is only looking at the relationship between the threats, vulnerabilities, and controls to evaluate the impact of a hypothetical breach. What type of approach to risk analysis is this? CORRECT ANSWER Qualitative Mark is using the qualitative approach which uses descriptions and words to measure the likelihood and impact of a risk. Examining the relationships between threats, vulnerabilities, and controls without quantitative measurements is a qualitative approach. Because some aspects of security can be difficult to measure, the qualitative approach is commonly used. If SLE of a risk is $25,000 and ARO occurs once every four years, then what will be the ALE? CORRECT ANSWER $6,250 The ALE (annual loss expectancy) value is calculated by multiplying an SLE by its ARO to determine the financial magnitude of a risk on an annual basis. ALE (annual loss expectancy) = SLE (single loss expectancy) X ARO (annual rate of occurrence) If SLE of a risk is $25,000 and ARO occurs once every four years, then ALE is $6,250 ($25,000*0.25). Rose, a security administrator, implements screen savers that lock the PC after five minutes of inactivity to help prevent unauthorized access to PC. Which of the following controls is being described in this situation? CORRECT ANSWER Technical The controls described in this scenario such as preventing unauthorized access to PCs and applying screensavers that lock the PC after five minutes of inactivity is a type of a technical control. Technical controls, also called logical controls, are hardware or software installations implemented to monitor and prevent threats and attacks to computer systems and services. It also includes controls such as identification and authentication, access control, audit and accountability as well as system and communication protection Rosy wants to implement a security control to monitor and prevent threats and attacks to computer systems and services. Which of the following security controls should she implement to accomplish the task? CORRECT ANSWER Technical Rosy should implement technical controls to accomplish the task. Technical controls, also called logical controls, are hardware or software installations implemented to monitor and prevent threats and attacks to computer systems and services.

Show more Read less
Institution
CYBERSECURITY ANALYST
Course
CYBERSECURITY ANALYST











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CYBERSECURITY ANALYST
Course
CYBERSECURITY ANALYST

Document information

Uploaded on
December 31, 2022
Number of pages
48
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • vulnerabilities

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
cracker Chamberlain School Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
2007
Member since
3 year
Number of followers
1342
Documents
46823
Last sold
1 day ago
✨ Cracker – Verified Study Powerhouse

Welcome to your shortcut to academic and certification success. I'm Cracker, a trusted top seller I specialize in high-quality study guides, test banks, certification prep, and real-world exam material all tailored to help you pass fast and score high.

3.8

368 reviews

5
162
4
84
3
51
2
22
1
49

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions