CySA+ Study for PASS Certification Exam !!! Flashcards

1
Q

Integrity : ensures info is not subject to unauthorized modification.

confidentiality : protects info from unauthorized access

Availability : ensures that authorized users can access info when they are permitted to do so.

A

IOA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

??? focuses on ways that an org. can use / share info that it has collected about individuals; goes beyond just security of this info.

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

??? is weakness in device, system, application, or process that might allow an attack to take place; are internal factors, a web server can be outdated allowing attacker to do DoS affecting availability, can remedy by upgrading server to most recent version. Can perform scan for vulnerability.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

outside force that may exploit a vulnerability. A threat may also not be malicious, could be an earthquake etc.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

combination of threat and corresponding vulnerability, ex : if hacker targets org.’s web server w/DoS attack but server was patched then there is no risk because even though a threat is present (the hacker), there is no vulnerability.

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

??? are individuals, groups, and org.’s attempting to undermine security of an org. Adversaries may include trusted insiders, competitors, suppliers, customers, business partners, or even nation-states. CySA’s should consider capability of threat actor to engage in attacks, intent of threat actor, and likelihood threat will target org.

A

Adversarial Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

when equipment, software, or environmental controls fail due to exhaustion of resources (such as running out of gas), exceeding their operational capability (such as operating in extreme heat), or simply failing due to age. Structural threats may be IT components (like storage, servers and network devices), environmental controls (such as power and cooling infrastructure), and software (such as OS’s and applications).

A

Structural Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

software called supplicant resides on device requesting to join network, supplicant communicates with authenticator which runs on WAP or network switch, authenticator passes access requests to authentication server using RADIUS, user if correctly authenticates is then allowed access to the network; if not then user is quarantined in special part of network.

A

RADIUS (802.1x)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

??? : require that device requesting access to network run special software designed to communicate with the ??? service. ??? : approaches to ??? conduct authentication in web browser and doesnt require special software.

A

NAC (Agent-Based) / NAC (Agentless)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

??? : use dedicated appliances that sit in between devices and the resources that they wish to access; they deny or limit network access that do not pass ??? authentication process. Captive portal is an example of in-band. ??? : like 802.1x, leverage existing network infrastructure and have network devices communicate w/authentication servers and then reconfigure the network to grant or deny access as needed.

A

NAC (In-Band) / NAC (Out-of-Band)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly