100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Sybex cysa+ study UPDATED ACTUAL Questions and CORRECT Answers

Beoordeling
-
Verkocht
-
Pagina's
36
Cijfer
A+
Geüpload op
28-09-2025
Geschreven in
2025/2026

Sybex cysa+ study UPDATED ACTUAL Questions and CORRECT Answers

Instelling
Cysa
Vak
Cysa

Voorbeeld van de inhoud

Sybex cysa+ study UPDATED ACTUAL Questions and CORRECT Answers

Preparation
Name the four phases of cybersecurity incident response detection and analysis
process containment, eradication, and recovery
and post incident activities
What NIST publication contains guidance on cybersecurity
incident handling?

A. SP 800-53 SP 800-61
B. SP 800-88
C. SP 800-18
D. SP 800-61
FTP (File Transfer Protocol) Port 20-21
SSH (Secure Shell) Port 22
Telnet Port 23
SMTP(Simple Message Transfer Protocol) Port 25
DNS(Domain Name System) UDP Port 53
HTTP(Hypertext transfer protocol) port 80
POP3 (Post Oflce Protocol version 3) Port 110
NTP (Network Time Protocol) UDP Port 123
IMAP (Internet Message Access Protocol) 143
LDAP (Lightweight Directory Access Protocol) Port 389 TCP/UDP
HTTPS(Hypertext transfer protocol Secure) Port 443
LDAPS(Lightweight Directory Access Protocol Secure) Port 636
- Port 1433
SQL Server -Microsoft SQL Database
-helps with database administration
Oracle Port 1521

, PPTP(Point to Point Tunneling protocol) Port 1723
RDP(Remote Desktop Protocol) Port 3389
When Technical, operational, or financially a application
Compensating Controls cannot be updated so other changes are done to negate
the vulnerability.
- Planning; scope, timing, authorization
- Discovery; OSINT, reconnaissance
Phases to a penetration Test - Attack Phase; gain access, escalation privileges
- Reporting; detailed reporting communicating the access
they achieved
Hashing Mathematical fingerprint of file
Standardized Process and carry out the steps you've al-
Playbook
ready thought through
allow us to send a signal from one application to another
Webhooks
using a web request
single pane of glass approach integrate all tools into a single platform
designed to automatically extract knowledge from volumi-
Machine Learning nous quantity of information generated by security sys-
tems
Threat an outside force that may exploit a vulnerability
XCCDF (Extensible Configuration Checklist description for- a language that is used in creating checklists for reporting
mat) results
System provides a reference method for publicly known
CVE (Common Vulnerabilities and Exposures )
information- security vulnerabilities and exposures
Provides unique identifiers to system configuration issues
(CCE)Common Configuration Enumeration to facilitate fast and accurate correlation of configuration
data across multiple information sources and tools
CPE (Common Platform Enumeration)


,A standardized method of describing and identifying
classes of applications, operating systems and hardware
devices present among an enterprise computing assets
special purpose computer on a network specifically de-
signed and configured to withstand attacks. Computer
Bastion hosts
generally hosts a single application, ie; proxy server with
other services removed or limited to reduce the threat.
A database used for managing entities in a communica-
MIB (Management Information Base)
tion network
The penetration tester takes an average hacker's role with
Black box
no internal knowledge of the target's system
is explicitly designed to authorize claims and not to au-
OAuth2
thenticate users
Reconnaissance; gather info about a target

Weaponization; create malicious payload tailored to tar-
get

Delivery; transmit malicious payload

Cyber Kill chain phases Exploitation; exploit vulnerabilities to gain access

Installation; install malware on target system

Command-and-control; establish communication channel
between attacker and compromised

Actions on objectives; achieve the attacker's ultimate goal
Registered Ports 1024-49151

Process Monitor


, Advanced monitoring tool for windows that shows
real-time file system, registry, and process/thread activity
Command line utility whose primary purpose is monitor-
ProcDump ing an application for CPU spikes and generating crash
dumps
Serverless computing, when a action needs performed,
FaaS(Function as a service)
the function is run-thus "a function call"
-Updating and patching the system
-removing unnecessary software and services
System Hardening -restricting and logging administrative access
-disk encryption
-enabling logging and using appropriate monitoring
Provides range of hardening guides and configuration
CIS(Center for Internet Security)
benchmarks for common operating systems
HKEY_Classes_Root(HKCR) - Association file types with
programs
HKEY_Local_MACHINE(HKLM)- Scheduled task & Services,
sys info
Registry
HKEY_USERS(HKU) - info about user accounts
HKEY_CURRENT_USR(HKCU)-info about current user
HKEY_CURRENT_CONFIG(HKCC)- current local hardware
profile information storage
C:\Program data|
Windows Storage
C:\ProgramFiles\
Linux /etc/directory
MacOS ~/library/Preferences and /library/Preferences
Wininit.exe (Windows Initialization Process)
Winlogon.exe (Windows logon process)

Geschreven voor

Instelling
Cysa
Vak
Cysa

Documentinformatie

Geüpload op
28 september 2025
Aantal pagina's
36
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€12,63
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
MGRADES Stanford University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1137
Lid sinds
2 jaar
Aantal volgers
104
Documenten
69677
Laatst verkocht
1 uur geleden
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3,8

179 beoordelingen

5
77
4
31
3
47
2
9
1
15

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen