CompTIA CySA+ CS0-003 Deck 3 Flashcards

Learn key concepts found in the CompTIA CySA+ CS0-003 Exam.

1
Q

(TTPs) Tactics, Techniques, and Procedures

A

TTPs are the methods used to conduct an action, such as performing an attack, and can be beneficial when attempting to ascertain attack patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(UEBA) User and Entity Behavior Analytics

A

A system that can provide automated identification of suspicious activity by user accounts and computer hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MITRE (ATT&CK) Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK)

A

A knowledge base maintained by the MITRE Corporation for listing and explaining specific adversary tactics, techniques, and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Reconnaissance

A

The actions taken to gather information about an individual or organization’s computer systems and software. This typically involves collecting information such as the types of systems and software used, user account information, data types, and network configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(OSINT) Open-Source Intelligence

A

Publicly available information plus the tools used to aggregate and search it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dark Web

A

Resources on the Internet that are distributed between anonymized nodes and protected from general access by multiple layers of encryption and routing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(ISACs) Information Sharing and Analysis Centers

A

A not-for-profit group set up to share sector-specific threat intelligence and security best practices among its members.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threat Hunting

A

A cybersecurity technique designed to detect presence of threats that have not been discovered by normal security monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cyber Threat Intelligence

A

The process of investigating, collecting, analyzing, and disseminating information about emerging threats and threat sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Lateral Movement

A

The process by which an attacker is able to move from one part of a computing environment to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(IoAs) Indicators Of Attack

A

Signs or clues indicating a malicious attack on a system or network is currently occurring. These include, but are not limited to, unusual network traffic, strange log file entries, or suspicious user account activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Crowdsourced

A

A process in which a large group of individuals, usually from the public, are asked to contribute to a project or task. It often involves the collection of ideas, information, opinions, or feedback from a wide range of people, typically through an online platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(MSSP) Managed Security Service Providers

A

A third-party provision of security configuration and monitoring as an outsourced service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(IoCs) Indicators Of Compromise

A

A sign that an asset or network has been attacked or is currently under attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Privileged User Account

A

A user account with elevated access to a system and that is granted additional permissions that other user accounts do not have. These additional permissions allow privileged users to perform administrative tasks and access sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(DDoS) Distributed Denial-Of-Service

A

An attack that involves the use of infected Internet-connected computers and devices to disrupt the normal flow of traffic of a server or service by overwhelming the target with traffic.