CYSA+ Flashcards
(184 cards)
A cyber security consultant is examining security control classes for an Infrastructure as a Service (IaaS) provider. The classes measure how effectively assets are protected. Which security control class would the consultant examine to gain oversight of the information system?
a. technical
b. managerial
c. operational
d. detective
B. Managerial
The managerial control gives oversight of the information system. Examples could include risk identification or a tool allowing the evaluation and selection of other security controls.
A mission-critical system is offline at an organization due to a zero-day attack. The associated software vendor plans to release a patch to remediate the vulnerability. Which of the following are important patch management considerations for this scenario? (Select the three best options.)
A. a patch test environment
B. speedy push delivery of critical security patches
C. a specific team responsible for reviewing vendor-supplied newsletters and security patch bulletins
D. a routine schedule for the rollout of noncritical patches
A, B, and C
A support manager is giving essential security training to the help desk. Which control class is the support manager implementing?
a. operational
b. technical
c. detective
d. managerial
A. operational
Operational controls are primarily implemented and executed by people (as opposed to systems). For instance, security guards and training programs are examples of operational controls.
An IT director reviews a cyber security audit and learns that an old accounting server is significantly out of compliance. Rather than attempting repairs, the director concludes that decommissioning the server is the safest course of action. What is the risk management principle the IT director is following?
a. risk acceptance
b. risk mitigation
c. risk avoidance
d. risk transference
C. risk avoidance
An organization recently had an attack that resulted in system data loss. The system administrator must now restore the system with a data backup. What functional security control was the system administrator able to implement?
a. preventative
b. responsive
c. corrective
d. compensating
C. corrective
A good example of a corrective control is a backup system that can restore data that an attacker damages during an intrusion.
A CEO of a small corporation has decided to continue using a legacy system despite security concerns. This is an example of which risk management principle?
a. risk acceptance
b. risk avoidance
c. risk mitigation
d. risk transference
a. risk acceptance
A security engineer installs a next-generation firewall on the perimeter of a network. This installation is an example of what type of security control class?
a. managerial
b. operational
c. detective
d. technical
d. technical
The legal affairs team of an international conglomerate elects to assign certain risks to a third party. Which risk management principle are they implementing?
a. risk acceptance
b. risk avoidance
c. risk mitigation
d. risk transference
d. risk transference
Risk transference (or sharing) means the company would assign risk to a third party, which they would typically accomplish through insurance policies. Insurance transfers financial risks to a third party.
An engineer is considering appropriate risk responses using threat modeling. They are trying to understand which threat actors are in scope for their organization. How does threat modeling identify the principal risks and tactics, techniques, and procedures (TTPs) for which their system may be susceptible? (Select the three best options.)
a. by evaluating the system from an attacker’s point of view
b. by evaluating a system from a neutral perspective
c. through using tools such as diagrams
d. by analyzing the system from the defender’s perspective
A, C, and D
A system administrator is performing patchwork on their organization’s system. The administrator realizes the maintenance window will close before they complete the patchwork. What action must the administrator take to abide by the change management policy?
a. rollback to the system’s previous state
b. rollout earlier patches
c. rollback to a system’s initial state
d. rollout system patches
a. rollback to the system’s previous state
A system administrator is hardening a newly provisioned server with software patches and security updates. What functional security control is the system administrator performing?
a. detective
b. preventative
c. corrective
d. compensating
b. preventative
A support team is preparing for an upcoming maintenance window. What tasks should the support team accomplish during the proactive maintenance windows? (Select the three best options.)
a. implement untested patches
b. restart devices
c. analyze events
d. restore critical services after a backup test
B, C, and D
A security analyst reviews a firewall log’s source IP addresses to investigate an attack. These logs are a representation of what type of functional security control?
a. corrective
b. preventative
c. detective
d. compensating
c. detective
A large corporation’s security operations center (SOC) team is processing a recent incident. The team refers to a playbook for guidance about the incident. What type of functional security control does the playbook represent?
a. corrective
b. preventative
c. responsive
d. compensating
c. responsive
Responsive controls serve to direct corrective actions enacted after the SOC team confirms the incident. The team often documents these actions in a playbook.
A systems administrator runs a scan on an application server and finds several vulnerabilities. The issues are not severe, and patches are available in each instance. The administrator decided to install the available patches. What risk management principle did they demonstrate?
a. risk mitigation
b. risk acceptance
c. risk avoidance
d. risk transference
a. risk mitigation
A cybersecurity analyst wants to collect indicators of compromise (IoCs) to identify, investigate, and mitigate threats. What are some examples of IoCs that the analyst will be collecting? (Select the three best options.)
a. expected configuration changes
b. odd network patterns
c. unusual account behaviors
d. unfamiliar new files
B, C, and D
A geographically diverse group of hackers commit fraud against a small company for commercial gain. What type of threat actor committed this fraud?
a. organized crime
b. hacktivist
c. nation-state
d. insider threat
a. organized crime
A security analyst is analyzing systems for potential misconfiguration. Misconfiguration hunting is an important focus area. What are some key items the analyst should search for while misconfiguration hunting? (Select the three best options.)
a. weak passwords
b. open ports
c. unpatched software
d. isolated networks
A, B, and C
A security consultant is using the dark web as a source of defensive open-source intelligence (OSINT). Which of the following should the consultant be aware of when using the dark web? (Select the three best options.)
a. the dark web is protected by a single layer of encryption
b. the dark web serves as an operating platform for cybercrimes
c. threat actors leverage the dark web for criminal activities
d. the dark web can provide evidence of previously undiscovered breaches
B, C , and D
A threat actor obtains and releases confidential information about a political candidate to the public domain. The information damages the person’s candidacy and helps the opposing party. These actions were likely performed by which type of threat actor?
a. insider threat
b. script kiddie
c. organized crime
d. hacktivist
D. hacktivist
A security analyst is reviewing an announcement from the Cybersecurity and Infrastructure Security Agency. Which source of defensive open-source intelligence (OSINT) does the agency represent?
a. CERT
b. internal sources
c. government bulletins
d. CSIRT
c. government bulletins
Agents from a sovereign region in North Africa perform a cyber attack against the energy infrastructure of a neighboring republic. What type of threat actor does this scenario illustrate?
a. insider threat
b. organized crime
c. hacktivist
d. nation-state
d. nation-state
Nation-state actors have participated in many attacks, particularly on energy and electoral systems. The goals of nation-state actors are primarily espionage and strategic advantage.
An attacker is browsing social media accounts associated with a targeted organization. Why is the attacker using social media in this manner? (Select the three best options.)
a. attackers can use social media sites to find an organization information
b. attackers can leverage social media as a vector to launch attacks against targets
c. attackers can use information from social media as a source of defensive OSINT
d. an attacker may find posts or user profiles that give away sensitive information
A, B, and D
An attacker is planning to target a business-critical database for a large enterprise. What are some business-critical asset-hunting methods that security analysts use to protect systems? (Select the two best options.)
a. search for unauthorized access attempts
b. search for misconfigured systems
c. search for unusual traffic patterns
d. search for routine activity
A and C
Business-critical asset hunting involves searching for vulnerabilities and threats that could impact these assets.