CySA+ Concepts Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A
17
Q
A
18
Q
A
19
Q
A

The “redirect” domain acts as a pointer to another domain. As soon as you access a web page on the redirect domain, the URL in your browser changes to the domain to which you are being redirected. There many times when there are reports of users receiving phishing emails which contain links that redirect to a fake login page after successful authentication; you should mitigate this vulnerability by ensuring that the redirection domains are properly configured

20
Q
A
21
Q
A

An example of risk acceptance is when a device is discovered, which has an OS that will no longer be maintain or updated for the foreseeable future. A risk-based policy decision is made by the security committee prior to the end of life of a critical device to review and reinforce the vendor upgrade.

22
Q
A
23
Q
A

When updating infrastructure in phases (monthly upgrades of the infrastructure, biweekly upgrades of the workstations) the best way to manage company-wide changes is to perform a monthly topology scan, a biweekly host discovery scan, and a monthly vulnerabilities scan.

24
Q
A

Among the options for validating and input on incoming web forms, server-side whitelisting is the most secure and manageable. And example of server-side whitelisting is accepting only known good input. Before excepting input for further processing, it may be necessary to validate that it matches the expected type, length, or size, numeric range, or other format standards

25
Q
A
26
Q
A

To verify whether the scan device meets security policies, “unauthenticated” vulnerability scans would be the ideal vulnerability scan in system hardening. A vulnerability exploration process is performed without logging in as an authorized user on a network or networked system. An unauthentified vulnerability scan, a system is inspected from the outside, in order to assess its security from an outsider perspective.

27
Q
A

In the case of EDR tools failing to detect malware, virtual desktop infrastructure (VDI) is the most effective security control that can be implemented when EDR tools failed to detect malware, creating a risk to the organization and its employees. Moreover, employees are able to exchange files without fear of malware at client sites.