Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CySA+ Exam

All Areas

QuestionAnswer
Which one of the following categories of threat requires that cybersecurity analysts consider the capability, intent and targeting of the threat source? Which one of the following categories of threat requires that cybersecurity analysts consider the capability, intent and targeting of the threat source?
Cindy is conducting a cybersecurity risk assessment and is considering the impact that a failure of her city's power grid might have on the organization. What type of threat is she considering? Environmental
Ben is preparing to conduct a cybersecurity risk assessment for his organization. If he chooses to follow the standard process proposed by NIST, which one of the following steps would come first? Identify threats
Tommy is assessing the security database servers in his datacenter and realizes that one of them is missing a critical Oracle security patch. What type of situation has Tommy detected? Vulnerability
Which one of the following objectives is not one of the three main objectives that information security professionals must achieve to protect their organizations against cybersecurity threats? Nonrepudiation
security incident that compromised one of his organization's web servers, but believe that the attackers modified or stole any information, but they did disrupt access to the organization's website. What cybersecurity objective did this attack violate? Availability
Which one of the following is an example of an operational security control? penetration tests
Encryption software, network firewalls, and antivirus software are all examples of _________________ security controls. Technical
A risk assessment and determined that his network was vulnerable to hackers connecting to open ports on servers. He implemented a network firewall to reduce the likelihood of a successful attack. What risk management strategy did Paul choose to pursue? risk mitigation
Robert's organization has a BYOD policy, and he would like to ensure that devices connected to the network under this policy have current antivirus software. What technology can best assist him with this goal? network access control
When performing 802.1x authentication, what protocol does the authenticator use to communicate with the authentication server? RADIUS
Juan is configuring a new device that will join his organization's wireless network. The wireless network uses 802.1x authentication. What type of agent must be running on the device for it to join this network? 802.1x supplicant
Rick is preparing a firewall rule that will allow network traffic from external systems to a web server running the HTTPS protocol. What TCP port must he allow to pass through the firewall? 443
What type of firewall provides the greatest degree of contextual information and can include information about users and applications in its decision-making process? Next Generation Firewalls
Wayne is configuring a jump box server that system administrators will connect to from their laptops. Which port should definitely not be open on the jump box? 23
Kevin would like to implement a specialized firewall that can protect against SQL injection, cross-site scripting, and similar attacks. What technology should he choose? WAF
Which one of the following techniques might be used to automatically detect and block malicious software that does not match known malware signatures? Sandboxing
What is the BEST tool to use when an organization experience a data breach and a legacy web server was not being used in over year also was not regularly patched? Nmap
A security analyst is conducting a vulnerability assessment of older SCADA devices on the corporate network and name the compensating controls that prevent the scans from providing value? Detailed and Tested Firewall rules that effectively prevent outside access of the SCADA devices?
During and investigation a computer is being seized and what is the next step analyst should take? Power off the computer and remove it from the network
A company has ongoing vulnerability management program and procured latest technology to support, However the program is failing due to several vulnerabilities not being detected and how can you reduce false negatives? Perform credential scans
The security analyst investigated the destination IP for this transfer and discovered that this new process is not documented in the change management log. Which of the following would be the BEST course of action for the outbound SFTP process? Investigate a potential incident
A forensically sound copy of an employee's hard drive was received an analyst needs to get suspects inappropriate images which may have been deleted from the hard drive what tool can help recover deleted evidence? File carving tool
A laptop has degraded performance and investigated the issue and discovered that CPU utilization, memory utilization, and outbound network traffic are consuming the laptop resources. Name the BEST course of actions to resolve the problem? Identify and remove malicious processes
A company has implemented WPA2, a 20-character minimum for the WiFi passphrase, and a new WiFi passphrase every 30 days, and has disabled SSID broadcast on all wireless access points. Which of the following is the company trying to mitigate? Downgrade attacks
Created by: CPrice1978
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards