CySA+ Study Notes 4 Flashcards

1
Q

(1) Maintain system security, (2) comply w/corporate policy, (3) comply w/regulatory requirements.

A

Why Manage Vulnerabilities?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(1) conduct quarterly internal/external vulnerability scans, (2) Repeat scans after any significant change, (3) use approved scanning vendor (ASV) for external scans, (4) remediate and re-scan until a clean report is achieved.

A

PCI DSS Requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(1) conduct regular vulnerability scans, (2) analyze results of scans, (3) remediate legitimate vuln.’s, (4) share info w/other agencies.

A

FISMA Requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

install a security agent on each server that can probe deep into servers configuration and check for vuln.’s, these agents then report any vuln.’s they may discover back to central vuln. management system.

A

Agent-based scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

user provides scanner w/credentials to log onto remote system and pull config info.

A

Credentialed Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(1) Scan Engine Updates = software updates to scanner itself that fixes bugs and adds new features. (2) Plug-In updates = vuln. feed updates that provide scanner w/info about current vuln.’s.

A

Scanner Maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(1) may accidentally exploit vuln.’s, (2) will miss some vuln.’s due to firewall settings, network segmentation, IDS/IPS deployments.

A

Active Scanning Disadvantages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(1) System criticality, (2) information sensitivity, (3) vuln. severity, (4) remediation difficulty, (5) vuln. exposure ( is vuln. exposed to attacker?)

A

Setting Remediation of Vuln.’s Priorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(1) Detection : Scan environment for new vuln. (2) Analysis : assign that vuln to CySA for further review to find out if we are dealing with real vuln. and not false positive. (3) Remediation phase : where technical staff correct the vuln. we try to patch if patching doesnt work then we use other methods like sandboxing and testing etc … (4) Remediation Validation : control moves back to CySA and runs new vuln. scan and ensures no vuln. is still there.

A

Remediation Workflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

creates a consistent language and format for discussing security issues.

A

SCAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly