CySA+ Study Notes 11 Flashcards

1
Q

KPIs = metrics that demonstrate success of the security program; looks back at past on security.

KRIs = predict likelihood of future risks materializing; future looking perspective on security.

KRI Criteria : business impact, effort to implement, measure and support; reliability, and sensitivity.

A

info …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Structured Threat Information Expression (STIX™) is a language and serialization format used to exchange cyber threat intelligence (CTI). STIX enables organizations to share CTI with one another in a consistent and machine readable manner, allowing security communities to better understand what computer-based attacks they are most likely to see and to anticipate and/or respond to those attacks faster and more effectively. STIX is designed to improve many different capabilities, such as collaborative threat analysis, automated threat exchange, automated detection and response, and more.

A

STIX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trusted Automated Exchange of Intelligence Information (TAXII™) is an application layer protocol for the communication of cyber threat information in a simple and scalable manner. TAXII is a protocol used to exchange cyber threat intelligence (CTI) over HTTPS. TAXII enables organizations to share CTI by defining an API that aligns with common sharing models. TAXII is specifically designed to support the exchange of CTI represented in STIX.

A

TAXII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mobile ATT&CK : A set of tactics, techniques and common knowledge that focuses on Adversary behavior inside of the Enterprise, predominantly focusing on the mobile environment. Focuses on Exploit, Control, Execute and Maintain stages of an attack.

A

Mobile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Enterprise ATT&ACK : A set of tactics, techniques and common knowledge that focuses on Adversary behavior inside of the Enterprise. Focuses on Exploit, Control, Execute and Maintain stages of an attack.

A

Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PRE-ATT&CK: A set of tactics, techniques and common knowledge that focuses on Adversary behavior outside of the Enterprise. Focuses on Recon, Weaponize and Deliver stages of an attack.

A

PRE-ATT&CK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

??? is the phase 3 of the Penetration Testing or Ethical Hacking. It is a process of gaining complete access to the system by compromising the vulnerabilities identified in the first two phases.

A

Vulnerability Identification (Mapping / Enumeration)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

provide deep visibility such as network load, scanning w/o credentials, assets using dynamic IPs etc …

A

Agent-Based Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Server Scanning detects vulnerabilities, missing security patches and out-of-date software across all your external servers

A

Server-Based Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

??? It indicates that the parties have reached an understanding and are moving forward. Although it is not legally binding, it is a serious declaration that a contract is imminent.

??? defines the level of service you expect from a vendor, laying out the metrics by which service is measured, as well as remedies or penalties should agreed-on service levels not be achieved.

A

MOU / SLA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly