100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

CYSA+ EXAM 2023 100% VERIFIED SOLUTIONS I'm preparing to conduct a cybersecurity risk assessment for his organization. If he chooses to follow the standard process proposed by NIST, which one of the following steps would come first? A. Determine Likeli

Puntuación
-
Vendido
-
Páginas
21
Grado
A+
Subido en
04-05-2024
Escrito en
2023/2024

CYSA+ EXAM 2023 100% VERIFIED SOLUTIONS I'm preparing to conduct a cybersecurity risk assessment for his organization. If he chooses to follow the standard process proposed by NIST, which one of the following steps would come first? A. Determine Likelihood B. Determine Impact C. Identify Threats D. Identify Vulnerabilities? - ANSWER C. ID Threats I'm conducting a CS risk assessment and am considering the impact that a failure of the city power grid might have on the org. What type of threat am I considering? A. Adversarial B. Accidental C. Structural D. Environmental - ANSWER D. Environmental Which one of the following is an example of an operational security control? A. Encryption software B. Network Firewall C. Antivirus D. Penetration Tests - ANSWER D. Penetration Tests I would like to implement a specialized firewall that can protect against SQL injection, cross-site scripting, and similar attacks. What tech should I choose? A. NGFW B. WAF C. Packet Filter D. Stateful Inspection - ANSWER B. WAF Which of the following measures is not commonly used to assess threat intel? A. Timeliness B. Detail C. Accuracy D. Relevance - ANSWER B. Detail I want to send threat info via a standardized protocol specifically designed to exchange cyberthreat info. What should I choose? A. STIX 1.0 B. OpenIOC C. STIX 2.0 D. TAXII - ANSWER D. TAXII What phase of the Cyber Kill Chain includes creation of persistent backdoor access for attackers? A. Delivery B. Exploitation C. Installation D. C2 - ANSWER C. Installation What common criticism is leveled at the Cyber Kill Chain? A. Not all threats are aimed at a kill. B. It is too detailed. C. It includes actions outside of the defended network. D. It focuses too much on insider threats. - ANSWER C. It includes actions outside of the defended network. Which of the following is not a common technique used to defend against command and control (C2) capabilities deployed by attackers? A. Network Hardending B. Patching against zero-day attacks C. Deploying detection capabilities D. Tracking new C2 methods and technology - ANSWER B. Patching against zero-day attacks What drove the creation of ISACs in the US? A. Threat info sharing for infrastructure owners B. The Cybersecurity Act of 1994 C. Threat info collection network providers D. The 1998 ISAC Act - ANSWER A. Threat info sharing for infrastructure owners OpenIOC uses a base set of indicators of compromise originally created and provided by which security company? A. Mandiant B. McAfee C. CrowdStrike D. Cisco - ANSWER A. Mandiant I want to select a threat framework for my org, and identifying threat actor tactics in a standardized way is an important part of my selection process. Which threat model would be my best choice? A. The Diamond Model B. ATT&CK C. The Cyber Kill Chain D. The Universal Threat Model - ANSWER B. ATT&CK Forensic data is most often used for what type of threat assessment data? A. STIX B. Behavioral C. IOCs D. TAXII - ANSWER C. IOCs What flag does nmap use to enable operating system identification? A. -os B. -id C. -o D. -osscan - ANSWER C. -o

Mostrar más Leer menos
Institución
CYSA M
Grado
CYSA m










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CYSA m
Grado
CYSA m

Información del documento

Subido en
4 de mayo de 2024
Número de páginas
21
Escrito en
2023/2024
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$10.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
wilberforce

Conoce al vendedor

Seller avatar
wilberforce Teachme2-tutor
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1
Miembro desde
1 año
Número de seguidores
0
Documentos
289
Última venta
1 año hace

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes