CompTIA CySA+ CS0-003 Deck 1 Flashcards

Learn key concepts found in the CompTIA CySA+ CS0-003 Exam.

1
Q

Security Operations Centers (SOC)

A

The location where security professionals monitor and protect critical information assets in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Risk avoidance

A

In risk mitigation, the practice of ceasing activity that presents risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risk acceptance

A

The response of determining that a risk is within the organization’s appetite and no countermeasures other than ongoing monitoring is needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk mitigation

A

The response of reducing risk to fit within an organization’s willingness to accept risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk transference

A

In risk mitigation, the response of moving or sharing the responsibility of risk to another entity, such as by purchasing cybersecurity insurance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threat modeling

A

The process of identifying and assessing the possible threat actors and attack vectors that pose a risk to the security of an app, network, or other system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Technical Control

A

A category of security control that is implemented as a system (hardware, software, or firmware). Technical controls may also be described as logical controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Operational Control

A

A category of security control that is implemented by people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Managerial Control

A

A category of security control that gives oversight of the information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Preventative Control

A

A type of security control that acts before an incident to eliminate or reduce the likelihood that an attack can succeed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Detective Control

A

A type of security control that acts during an incident to identify or record that it is happening.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Corrective Control

A

A type of security control that acts after an incident to eliminate or minimize its impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Compensating Control

A

A security measure that takes on risk mitigation when a primary control fails or cannot completely meet expectations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Responsive Control

A

A type of security control that serves to direct corrective actions after an incident has been confirmed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threat Actor

A

Person or entity responsible for an event that has been identified as a security incident or as a risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attack Surface

A

The points at which a network or application receive external connections or inputs/outputs that are potential vectors to be exploited by a threat actor.

17
Q

(NOC)

A

Network Operations Center

18
Q

What Is a Red Team?

A

A red team serves as the attacker in this simulation, using the same techniques and tools of hackers to evade detection and test the defense readiness of the internal security team.

19
Q

Cryptography

A

Cryptography is the process of hiding or coding information so that only the person a message was intended for can read it.

19
Q

What is a blue team?

A

Blue teams are defensive security professionals responsible for maintaining internal network defenses against all cyber attacks and threats.

20
Q

Secret Key Cryptography

A

Secret key cryptography, also known as symmetric encryption, uses a single key to encrypt and decrypt a message. The sender encrypts the plaintext message using the key and sends it to the recipient who then uses the same key to decrypt it and unlock the original plaintext message.

21
Q

Public Key Cryptography

A

Public key cryptography (PKC), or asymmetric cryptography, uses mathematical functions to create codes that are exceptionally difficult to crack. It enables people to communicate securely over a non-secure communications channel without the need for a secret key. For example, proxy re-encryption enables a proxy entity to re-encrypt data from one public key to another without requiring access to the plaintext or private keys.

22
Q

Name the common (PKC) Public Key Cryptography?

A

1.) (RSA)
2.) (ECC)
3.) (DSA)
4.) (IBE)
5.) (PKCS)
6.) Diffie-Hellman and Key Exchange Algorithm

23
Q

How can you Minimize the risks associated with cryptography?

A

Organizations and individuals can minimize and mitigate cryptography-related threats with a dedicated electronic key management system from a reputable provider. The solution must use a hardware security module to generate and protect keys, and underpin the entire system’s security.

It needs to include features like full key management life cycle, strong key generation, strict policy-based controls, swift compromise detection, secure key destruction, strong user authentication, secure workflow management, and a secure audit and usage log. This will protect the organization’s keys, enhance efficiency, and ensure compliance with data and privacy regulations.

Another potential solution is cryptography quantum, whereby it is impossible to copy data encoded in a quantum state.

24
Q

What are the three types of cryptography?

A

1.) Secret key cryptography
2.) Public key cryptography
3.) Hash function cryptography

25
Q

What is an example of cryptography?

A

The Rivest-Shamir-Adleman (RSA) algorithm is widely used on the Internet. RSA uses a pair of keys to encrypt and decrypt information.