CySA+ Study for PASS Certification Exam !!! Flashcards

1
Q

??? : is logging and monitoring that goes with authentication (authenticate users) and authorization (allows owner to perform actions or gain access to systems).

??? : built to create, store, and manage identity info and permissions, groups, and other info needed to support use of identities.

??? : used in networks to provide info about systems, users, and other info about an org. Ex : LDAP is a ???. LDAP has three modes : anonymous, unauthenticated, username/password authenticated.

A

Accounting / IAM systems / Directory Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Use CAPTCHA-stype methods to try and prevent brute force attacks.

For large amounts of passwords use password safes or password storage utilities like KeePass, Password Safe, Dashlane, 1Password, and LastPass, and enterprise password storage management tools.

A

info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

??? member of federation must provide identities, make assertions about those identities to relying parties, and release info to relying parties about identities holders. Identities and related data must be kept secure. Service providers may be responsible for providing incident response for the federation, communication between fed. members, etc …

A

IDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

??? : members of fed. must provide services to members of fed. and should handle data from both users and identity providers securely.

??? : may be asked to make decisions about attribute release and to provide validation info about their identity claims to the IDP.

A

RP (or SP) / Consumer or user of fed. services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Using Federation should develop a trust model like Google, LinkedIn, Amazon, then use technologies like : SAML, OAuth, OpenID Connect, etc …

SAML : XML- based language used to send authentication/authorization data between identity providers and service providers; authentication, attribute, and authorization decision statements are exchanged with SAML.

A

info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

??? : 1) feasibility phase where initial investigations into whether the effort should occur are conducted, also looks at alternative solutions and high-level costs for each solution proposed. This results in a recommendation w/a plan to move forward. 2) then typically goes through analysis and requirements definition phase, customer input is used to determine what desired functionality is, what current system or app currently does or doesnt do and what improvements are desired. 3) Design phase : includes design for functionality, architechture, integration points and techniques, dataflows, business processes, etc … (4) coding of app is done during this development phase and may involve testing parts of software and code analysis. (5) testing w/customers of parts of software during testing and integration phase; UAT occurs to ensure that users of software are satisfied w/its functionality. (6) training and transition phase. (7) Ongoing operations and maintenance phase, including patching, updating, minor modifications etc once project is complete. (8) Disposition phase : when product reaches end of its life.

A

SDLC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

??? : Phase 1 = requirements are gathered and documented, Phase 2 = analysis to build business rules and models. Phase 3 = software is designed coding and integration of software. Phase 4 = software complete. Phase 5 = testing and debugging. Phase 6 = operational phase w/support, maintenance, etc …

A

Waterfall Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

??? : has iterative process, phase 1 = identification or requirements gathering for business/system requirements. phase 2 = Design, conceptual, architectural, logical, sometimes physical or final design. Phase 3 = Build, provides initial proof of the concept then further development until final production build is produced. Phase 4 = Evaluation, risk analysis for development project intended to monitor the probability of delivering software from technical and managerial viewpoint. As this phase continues it involves customer testing and feedback.

A

Spiral Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

??? : iterative and incremental process - 1 = Individuals and interactions are more important than processes and tools. 2 = Working software is preferable to comprehensive documentation. 3 = Customer Collaboration replaces contract negotiation. 4 = Responding to change is key, rather than following a plan.

A

Agile Method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

??? : iterative process that relies on building prototypes and planning is done as software is written. 1 = Business Modeling : focuses on business model, including what info is important, how it is processed, and what the business process should involve. 2 = Data Modeling : include gathering and analyzing all datasets and objects needed for the effort and defining their attributes and relationships. 3 = Process modeling : dataflows based on business model and process descriptions for how data is handled. App Generation : through coding and automated tools to convert data and process models into prototypes. 4 = Testing and Turnover : dataflow and interfaces between components since prototypes are tested at each iteration for functionality.

A

RAD Method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly