100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CYSA, Top Exam Questions and answers, 100% Accurate. Graded A+ CA$15.00   Add to cart

Exam (elaborations)

CYSA, Top Exam Questions and answers, 100% Accurate. Graded A+

 3 views  0 purchase

CYSA, Top Exam Questions and answers, 100% Accurate. Graded A+ In the NIST Special Publication 800-53 Security and Privacy Controls for Federal Information Systems and Organizations, security controls are categories into one of 18 families. What does a category of RA mean? Regular Access R...

[Show more]

Preview 3 out of 16  pages

  • August 11, 2023
  • 16
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
  • cysa
All documents for this subject (480)
avatar-seller
PassPoint02
CYSA, Top Exam Questions and
answers, 100% Accurate. Graded A+

In the NIST Special Publication 800-53 Security and Privacy Controls for Federal Information Systems and
Organizations, security controls are categories into one of 18 families. What does a category of RA
mean?



Regular Access

Regulatory Administrative

Risk Assessment

Reduced Administration - ✔✔-Risk Assessment



Which security control functional type is used to identify and record any attempted or successful
intrusion?



Detective Control

Corrective Control

Preventative Control

Administrative Control - ✔✔-Detective Control



A detective control is a a type of security control that acts during an incident to identify or record that it
is happening. A detective control operates during the progress of an attack. Examples include logs and
security cameras which are used to maintain a record of actions taken by an attacker.



Which of the following automatically combines multiple disparate sources of information together to
form a complete picture of events for analysts to use during an incident response or when conducting
proactive threat hunting?



Machine Learning

Deep Learning

,Data Enrichment

Continuous integration - ✔✔-Data Enrichment



When data enrichment is occurring, it could combine a threat intelligence feed with a log of NetFlow.
This will allow the analyst to know if an IP address of interest is actually associated with a known APT.
Machine learning and deep learning are forms of artificial intelligence that may be used to conduct data
enrichment activities, but individually they are not sufficient to answer this question. Continuous
integration is a software development method in which code updates are tested and committed to a
development or build server/code repository rapidly, and is unrelated to this question.



In which phase of the security intelligence cycle is input collected from intelligence producers and
consumers to improve the implementation of intelligence requirements?



Feedback

Analysis

Dissemination

Collection - ✔✔-Feedback



The final phase of the security intelligence cycle is feedback and review, which utilizes the input of both
intelligence producers and intelligence consumers. The goal of this phase is to improve the
implementation of the requirements, collection, analysis, and dissemination phases as the life cycle is
developed.



Which of the following is an example of an open-source intelligence feed?



IBM X-Force Exchange

Recorded Future

FireEye

Malware Information Sharing Project - ✔✔-Malware Information Sharing Project



The Malware Information Sharing Project, or MISP, is an open-source intelligence feed. Other popular
open-source intelligence feeds are AT&T Security (Alien Vault Open Threat Exchange), Spamhaus, SANS

, ISC Suspicious Domains, VirusTotal, and NCAS by US0CERT. Closed-source or proprietary intelligence
sources include IBM X-Force Exchange, Recorded Future, and FireEye.



Which type of threat will patches NOT effectively combat as a security control?



Zero-day attacks

Known vulnerabilities

Discovered software bugs

Malware with defined indicators of compromise - ✔✔-Zero-day Attacks



Zero-day attacks have no known fix, so patches will not correct them. A zero-day vulnerability is a
computer-software vulnerability that is unknown to, or unaddressed by, those who should be interested
in mitigating the vulnerability (including the vendor of the target software). If a discovered software bug
or known vulnerability is found, there is normally a patch or mitigation available for it. If a piece of
malware has well-defined indicators of compromise, a patch or signature can be created to defend
against it, as well.



Which analysis framework provides the most explicit detail regarding how to mitigate or detect a given
threat?



Diamond Model of Intrusion Analysis

MITRE ATT&CK framework

OpenIOC

Lockheed Martin cyber kill chain - ✔✔-MITRE ATT&CK framework



The MITRE ATT&CK framework provides explicit pseudo-code examples for how to detect or mitigate a
given threat within a network and ties specific behaviors back to individual actors. The Diamond Model
provides an excellent methodology for communicating cyber events and allowing an analyst to implicitly
derive mitigation strategies. The Lockheed Martin cyber kill chain provides a general life cycle
description of how attacks occur but does not deal with the specifics of how to mitigate. OpenIOC
contains a depth of research on APTs but does not integrate the detections and mitigation strategy.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller PassPoint02. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for CA$15.00. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

82871 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
CA$15.00
  • (0)
  Add to cart