CompTIA CySA+ CS0-003 Deck 2 Flashcards

Learn key concepts found in the CompTIA CySA+ CS0-003 Exam.

1
Q

On-Premises

A

Software or services installed and managed on a customer’s computing infrastructure rather than in the cloud or hosted by a third-party provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(SaaS) Software As A Service

A

Cloud service model that provisions fully developed application services to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Software Repository

A

A centralized storage location for software packages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Footprint

A

An attack that aims to list resources on the network, host, or system as a whole to identify potential targets for further attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Change Management

A

Process through which changes to the configuration of information systems are implemented as part of the organization’s overall configuration management efforts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Nation-States

A

A type of threat actor that is supported by the resources of its host country’s military and security services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Organized Crime

A

A type of threat actor that uses hacking and computer fraud for commercial gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hacktivist

A

A threat actor that is motivated by a social issue or political cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Insider Threat

A

Type of threat actor who is assigned privileges on the system and causes an intentional or unintentional incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Script Kiddie

A

An inexperienced, unskilled attacker that typically uses tools or scripts created by others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(APT) Advanced Persistent Threat

A

Threat actors with the ability to craft novel exploits and techniques to obtain, maintain, and diversify unauthorized access to network systems over a long period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Virus

A

Malicious code inserted into an executable file image. The malicious code is executed when the file is run and can deliver a payload, such as attempting to infect other files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Trojan

A

A malicious software program hidden within an innocuous-seeming piece of software. Usually, the Trojan is used to try to compromise the security of the target computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(C&C or C2) Command and Control

A

Infrastructure of hosts and services with which attackers direct, distribute, and control malware over botnets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Exploits

A

A specific method by which malware code infects a target host, often via some vulnerability in a software process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Metasploit

A

A platform for launching modularized attacks against known software vulnerabilities.

16
Q

Persistence

A

In cybersecurity, the ability of a threat actor to maintain covert access to a target host or network.

17
Q

AAA

A

Authentication, Authorization, and Accounting

18
Q

Asset

A

An item of value to stakeholders/organization. An asset may be tangible (e.g., a physical item such as hardware, firmware, computing platform, network device, or other technology component) or intangible (e.g., humans, data, information, software, capability, function, service, trademark, copyright, patent, intellectual property, image, or reputation). The value of an asset is determined by stakeholders in consideration of loss concerns across the entire system life cycle. Such concerns include but are not limited to business or mission concerns.

19
Q

Stakeholder

A

Individual, team, organization, or classes thereof, having a right, share, claim, or interest in a system or in its possession of characteristics that meet their needs and expectations.

20
Q

SOA

A

Start of Authority

21
Q

STIX

A

(OASIS) Structured Threat Information Expression

22
Q

TAXII

A

(OASIS) Trusted Automated Exchange of Indicator Information

23
Q

DNS

A

Domain Name System

24
Q

Honeypots

A

A honeypot is a cybersecurity mechanism that uses a manufactured attack target to lure cybercriminals away from legitimate targets. They also gather intelligence about the identity, methods and motivations of adversaries.