CySA+ Study for PASS Ceritifcation Exam !!! Flashcards

1
Q

during drive acquisition using a ??? can ensure that attaching the drive to a forensic copy device or workstation doesnt result in the drive being altered.

A

Write Blockers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

??? : could be removal of malicious code from network, sanitization of compromised media, securing compromised user accounts, etc.

??? : focuses on restoring normal capabilities and services. Including reconstituting resources and correcting security control deficiencies that may have led to the attack, including rebuilding and patching systems, reconfiguring firewalls, updating malware sig.s’, etc also this phase is to reduce likelihood of successful future attack(s).

A

Eradication Phase / Recovery Phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

??? : finding root cause of problem and fixing it, like attacker compromises a router and root cause analysis reveals error in devices config’s, admins can correct the error on the routers to prevent similar attacks in the future.

A

Root Cause Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

??? : logical tech.’s to sanitize data in all user-addresable storage locations for protection against simple noninvasive data recovery tech.’s.

??? : applies physical or logical tech.’s that render data recovery infeasible using state-of-the-art lab tech.’s; ex’s : overwriting, block erase, cryptographic erase, and degaussing using magnets.

??? : renders target data recovery infeasible using SOTA lab tech.’s; ex:’s disintegration, pulverization, melting, and incinerating.

A

Clear / Purge / Destroy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

??? : org.’s take a formal approach to risk analysis that beings w/identifying risks, continues w/determining the severity of each risk, then results in adopting 1 or more risk management strategies to address each risk.

??? = Probability (likelihood) x Magnitude (Impact)

A

ERM / Risk Severity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

??? : collect smallest amount of info needed to meet business requirements.

??? : info should only be used for purpose that it was originally collected and was consented by data subjects.

A

Data Minimization / Purpose Limitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

??? : where systems and admins apply electronic tags to sensitive documents and then DLP systems can monitor systems and networks for unencrypted content containing those tags.

A

Watermarking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Plan and Organize, Acquire and Implement, Deliver and Support, Monitor and Evaluate

A

COBIT divides info tech activities into 4 domains :

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

COBIT Framework, Process Descriptions, Control Objectives, Management Guidelines, Maturity Models.

A

COBIT addresses 4 domains with framework :

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Service Strategy, Service Design, Service Transition, Service Operation, Continual Service Improvement

ALE = SLE x ARO

SLE = AV x EF

A

ITIL covers 5 core activites : (etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly