100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CompTIA Cybersecurity Analyst (CySA+) - Module 4: Security Architecture and Tool Sets. Rated A

Beoordeling
-
Verkocht
-
Pagina's
9
Cijfer
A+
Geüpload op
21-04-2023
Geschreven in
2022/2023

CompTIA Cybersecurity Analyst (CySA+) - Module 4: Security Architecture and Tool Sets. Rated A Document Content and Description Below CompTIA Cybersecurity Analyst (CySA+) - Module 4: Security Architecture and Tool Sets Which framework was designed to widen the focus of an organization to overall architecture? COBIT TOGAF SABS A ITIL -Answer- TOGAF (The Open Group Architecture Framework) The procedures in place to test controls need to be examined only by internal parties to ensure security. True False -Answer- False Which policies are responsible for securing employee profiles? Account Management Policy Acceptable Use Policy Data Ownership Policy Password Policy -Answer- Account Management Policy & Password Policy Which type of control would a software in charge of managing who has access to the network be? Administrative Control Defined Parameters Logical Control Physical Control -Answer- Logical Control Audits should be done by a third party to get a more accurate result. True False -Answer- True What type of verification method is based on a judgement call? Assessments Audit Evaluation Certification -Answer- Evaluation Which framework is distinguished by focusing exclusively on IT security?NIST TOGAF ISO ITIL -Answer- NIST (National Institute of Standards and Technology) What procedure is responsible for supplementing a lack of controls? Patching Managing Exceptions Control Testing Procedures Compensation Control Development -Answer- Compensation Control Development Which policy might govern how guests may use the companies WiFi? Data Retention Policy Account Management Policy Acceptable Use Policy Data Ownership Policy -Answer- Acceptable Use Policy A guideline is an adamant step by step listing of actions to be completed for a given task. True False -Answer- False In which procedure is everyone in the company told how to react and alert proper members of staff? Evidence Production Continuous Monitoring Remediation Plans Managing Exceptions -Answer- Evidence Production Which framework is distinguished by providing information assurance and is driven by risk analysis? TOGAF ITIL NIST SABSA -Answer- SABSA (Sherwood Applied Business Security Architecture) In which procedure do all factors need to be considered compared and tested before a decision is made? Managing ExceptionsRemediation Plans Evidence Production Continuous Monitoring -Answer- Remediation Plans What are reasons that data should be retained past it's first use? (Choose Several) Meeting legal and company policies Keeping the data from being abused Leverage Backups for frequently changed files -Answer- Meeting legal and company policies & Backups for frequently changed files In which procedure are those involved given limited knowledge to develop from? Evidence Production Compensation Control Testing Procedures Managing Exceptions -Answer- Testing Procedures An evaluation is scored against a benchmark or checklist. True False -Answer- False Which procedure is typically put into place because it is virtually impossible to perfectly match an entire environment? Patching Continuous Monitoring Compensation Control Managing Exceptions -Answer- Managing Exceptions Which of these frameworks are commercial and must be purchased? NIST ISO COBIT SABSA -Answer- ISO (International Organization for Standardization) & COBIT (Control Objectives for Information and Related Technologies) The Data Ownership Policy includes both acquisition and destruction of data. True False -Answer- False What policy determines how new users are provisioned/deprovisioned?Account Management Policy Data Ownership Policy Acceptable Use Policy Password Policy -Answer- Account Management Policy What assesses how well developed an organization's security capabilities are? Audits Remediation Plans Maturity Model -Answer- Maturity Model When attempting to provide defense in depth for personnel which of the following controls can be put into place? Choose all that apply. Dual Control Scheduled Review Training Cryptography -Answer- Dual Control & Training Network segmentation can be used in addition to security appliances in order to protect a network. True False -Answer- True Defense in depth is less of a necessity and more of a way for large companies who have extra funds to better secure their network True False -Answer- False Any singular technolog

Meer zien Lees minder
Instelling
CompTIA Cybersecurity Analyst
Vak
CompTIA Cybersecurity Analyst









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
CompTIA Cybersecurity Analyst
Vak
CompTIA Cybersecurity Analyst

Documentinformatie

Geüpload op
21 april 2023
Aantal pagina's
9
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Savior NCSU
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
95
Lid sinds
2 jaar
Aantal volgers
70
Documenten
3432
Laatst verkocht
1 week geleden

3,5

25 beoordelingen

5
9
4
7
3
3
2
0
1
6

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen