100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CYSA EXAM 2023LATEST UPDATE VERIFIED SOLUTIONS

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
01-05-2024
Written in
2023/2024

CYSA EXAM 2023LATEST UPDATE VERIFIED SOLUTIONS What are the three key objectives of information security? - ANSWER Confidentiality, integrity, and availability Risk exists at the intersection of _______ and _________. - ANSWER Threats and vulnerabilities. What is the overall risk rating for a risk that has medium likelihood and high impact? - ANSWER High What type of system controls access to a network based on criteria such as time of day, location, device type, and system - ANSWER Network access control What are the three networks typically connected to a triple-homed firewall? - ANSWER The Internet, an internal network, and a DMZ What is the TCP port for the HTTP protocol? - ANSWER 80 What is the TCP port for the HTTPS protocol? - ANSWER 443 What are the four types of firewalls? - ANSWER Packet filters, stateful inspection firewalls, next-generation firewalls, and web application firewalls. ______ may be used to apply settings to many different Windows systems at the same time. - ANSWER Group Policy Objects (GPOs) What are the four phases of penetration testing? - ANSWER Planning, Discovery, Attack, and Reporting What type of software can you use to enumerate the services that are accepting network connections on a remote system - ANSWER Port scanner What is the range of well-known ports? - ANSWER 0-1023 What is the range of registered ports? - ANSWER What is the most commonly used port scanner? - ANSWER nmap What Cisco logging level indicates a critical event? - ANSWER 2 What service is responsible for resolving domain names to IP addresses? - ANSWER DNS What tool can be used to determine the path between two systems over the Internet? - ANSWER Traceroute or tracert, depending on the operating system What service allows you to look up the registered owner of a domain name? - ANSWER Whois What type of data analysis looks for differences from expected behaviors? - ANSWER Anomaly analysis What type of data analysis predicts threats based on existing data? - ANSWER Trend analysis What regulation requires vulnerability scans for organizations involved in credit card processing? - ANSWER PCI DSS What regulation requires vulnerability scanning for federal government agencies? - ANSWER FISM

Show more Read less
Institution
CYSA
Course
CYSA









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CYSA
Course
CYSA

Document information

Uploaded on
May 1, 2024
Number of pages
8
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$10.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
wilberforce

Get to know the seller

Seller avatar
wilberforce Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
1 year
Number of followers
0
Documents
289
Last sold
1 year ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions