100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CYSA+ 002 UPDATED ACTUAL Questions and CORRECT Answers

Rating
-
Sold
-
Pages
20
Grade
A+
Uploaded on
28-09-2025
Written in
2025/2026

CYSA+ 002 UPDATED ACTUAL Questions and CORRECT Answers

Institution
Cysa
Course
Cysa










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cysa
Course
Cysa

Document information

Uploaded on
September 28, 2025
Number of pages
20
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

CYSA+ 002 UPDATED ACTUAL Questions and CORRECT Answers

A category of security control that is implemented as a
Technical (logical) controls
system (hardware, software, or firmware)
A category of security control that is implemented primar-
Operational Controls
ily by people rather than systems
A category of security control that provides oversight of the
Managerial Controls
information system
A control that acts to eliminate or reduce the likelihood that
Preventative Controls
an attack can succeed
A control may not prevent or deter access, but it will iden-
Detective Control
tify and record any attempted or successful intrusion
A control acts to eliminate or reduce the impact of an
Corrective Control
intrusion event
A type of security control that acts against in-person intru-
Physical Control
sion attempts
A type of security control that discourages intrusion at-
Deterrent Control
tempts
A type of security control that acts as a substitute for a
Compensating Controls
principal control
The process through which data generated in the ongo-
ing use of information systems is collected, processed,
Security Intelligence
analyzed, and disseminated to provide insights into the
security status of those systems
The process of investigating, collecting, analyzing, and
disseminating information about emerging threats and
Cyber Threat Intelligence threat sources to provide data about the external threat
landscape ªNarrative reports ªData Feeds You don't use
narrative reports or data feeds... you use both!

, Most security companies like McAfee, FireEye, Red Canary,
Threat Intelligence Reports
and numerous others produce these reports



Intelligence Cycle



1. Requirements Planning and Direction
2. Collection & Processing
Intelligence Cycle Steps 3. Analysis
4. Dissemination
5. Feedback
The Intelligence cycle phase that sets out the goals for the
Requirements (Planning & Direction)
intelligence gathering effort
The Intelligence cycle phase that is implemented by soft-
Collection (& Processing) ware tools, such as SIEMs, and then processed for later
analysis
The intelligence phase that performed against the giv-
en use cases from the planning phase and may utilize
Analysis
automated analysis, artificial intelligence, and machine
learning
The Intelligence cycle phase that refers to publishing in-
formation produced by analysis to consumers who need
to act on the insights developed
Dissemination
ªStrategic
ªOperational
ªTactical

The phase that aims to clarify requirements and improve
the collection, analysis, and dissemination of information
by reviewing current inputs and outputs


, ªLessons learned
Feedback ªMeasurable success
ªEvolving threat issues
Property of an intelligence source that ensures it is
Timeliness
up-to-date
Property of an intelligence source that ensures it matches
Relevancy
the use cases intended for it
Property of an intelligence source that ensures it produces
Accuracy
effective results
Property of an intelligence source that ensures it produces
Confidence Levels
qualified statements about reliability
Threat intelligence that is very widely provided as a com-
Proprietary mercial service offering, where access to updates and
research is subject to a subscription fee
Data that is derived from the provider's own research and
analysis efforts, such as data from honeynets that they op-
Closed-Source
erate, plus information mined from its customers' systems,
suitably anonymized

Data that available to use without subscription, may in-
clude threat feeds similar to the commercial providers,
and may contain reputation lists and malware signature
databases
ªUS-CERT
Open-Source ªUK's NCSC
ªAT&T Security (OTX)
ªMISP
ªVirusTotal
ªSpamhaus
ªSANS ISC Suspicious Domains

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1137
Member since
2 year
Number of followers
104
Documents
69677
Last sold
7 hours ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

179 reviews

5
77
4
31
3
47
2
9
1
15

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions