CompTIA CySA+ Key Points Overview
10 Questions
0 Views

CompTIA CySA+ Key Points Overview

Created by
@StateOfTheArtUnicorn

Questions and Answers

Which of the following CVE metrics would be most accurate for this zero-day threat?

  • CVSS: 31/AV: N/AC: L/PR: N/UI: H/S: U/C: L/I: N/A: H
  • CVSS: 31/AV: K/AC: L/PR: H/UI: R/S: C/C: H/I: H/A: L
  • CVSS: 31/AV: N/AC: L/PR: N/UI: N/S: U/C: H/I: H/A: L (correct)
  • CVSS: 31/AV: L/AC: L/PR: R/UI: R/S: U/C: H/I: L/A: H
  • Which of the following tools would work best to prevent the exposure of PII outside of an organization?

  • PAM
  • IDS
  • DLP (correct)
  • PKI
  • Which of the following tuning recommendations should the security analyst share?

  • Block requests without an X-Frame-Options header (correct)
  • Configure an Access-Control-Allow-Origin header to authorized domains
  • Disable the cross-origin resource sharing header
  • Set an HttpOnly flag to force communication by HTTPS
  • Which of the following items should be included in a vulnerability scan report? (Choose two.)

    <p>Affected hosts</p> Signup and view all the answers

    Which of the following would best protect an organization from new attacks that are exploited 45 days after a patch is released?

    <p>A mean time to remediate of 30 days</p> Signup and view all the answers

    Which of the following CVE metrics would be most accurate for a recently exploited zero-day vulnerability that impacts confidentiality and integrity?

    <p>CVSS: 31/AV: N/AC: L/PR: N/UI: N/S: U/C: H/I: H/A: L</p> Signup and view all the answers

    Which of the following tools would work best to prevent the exposure of PII outside of an organization?

    <p>DLP</p> Signup and view all the answers

    Which tuning recommendation should the security analyst share regarding a web application vulnerable to clickjacking?

    <p>Block requests without an X-Frame-Options header</p> Signup and view all the answers

    Which items should be included in a vulnerability scan report? (Choose two)

    <p>Risk score</p> Signup and view all the answers

    Which option would best protect an organization from exploitation occurring approximately 45 days after a patch is released?

    <p>A mean time to remediate of 30 days</p> Signup and view all the answers

    Study Notes

    CompTIA CySA+ Certification Exam Key Points

    • Zero-day vulnerabilities can have significant impacts on confidentiality and integrity without affecting availability.
    • CVE Metric Example:
      • Most relevant for active exploitation:
        • Attack vector: Network (AV:N)
        • Attack complexity: Low (AC:L)
        • Privileges: None required (PR:N)
        • User interaction: None required (UI:N)
        • Scope: Unchanged (S:U)
        • Confidentiality and Integrity: High (C:H, I:H)
        • Availability: Low (A:L)

    Data Protection Tools

    • Data Loss Prevention (DLP) is key in preventing exposure of Personally Identifiable Information (PII) by monitoring and blocking sensitive data.

    Web Application Vulnerabilities

    • Recommendations to mitigate vulnerabilities in web applications:
      • Block requests without an X-Frame-Options header to prevent clickjacking attacks.

    Vulnerability Scan Report Essentials

    • Important items to include in a vulnerability scan report:
      • Affected hosts: Identify IP addresses, hostnames, operating systems, and services.
      • Risk score: Assess severity and potential impacts of vulnerabilities.

    Organizational Security Measures

    • Mean Time to Remediate (MTTR) is crucial for timely vulnerability fixes; an MTTR of 30 days is optimal for addressing vulnerabilities exploited 45 days post-patch release.

    CompTIA CySA+ Certification Exam Key Points

    • Zero-day vulnerabilities can have significant impacts on confidentiality and integrity without affecting availability.
    • CVE Metric Example:
      • Most relevant for active exploitation:
        • Attack vector: Network (AV:N)
        • Attack complexity: Low (AC:L)
        • Privileges: None required (PR:N)
        • User interaction: None required (UI:N)
        • Scope: Unchanged (S:U)
        • Confidentiality and Integrity: High (C:H, I:H)
        • Availability: Low (A:L)

    Data Protection Tools

    • Data Loss Prevention (DLP) is key in preventing exposure of Personally Identifiable Information (PII) by monitoring and blocking sensitive data.

    Web Application Vulnerabilities

    • Recommendations to mitigate vulnerabilities in web applications:
      • Block requests without an X-Frame-Options header to prevent clickjacking attacks.

    Vulnerability Scan Report Essentials

    • Important items to include in a vulnerability scan report:
      • Affected hosts: Identify IP addresses, hostnames, operating systems, and services.
      • Risk score: Assess severity and potential impacts of vulnerabilities.

    Organizational Security Measures

    • Mean Time to Remediate (MTTR) is crucial for timely vulnerability fixes; an MTTR of 30 days is optimal for addressing vulnerabilities exploited 45 days post-patch release.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers essential points for the CompTIA CySA+ certification, focusing on zero-day vulnerabilities, data protection tools, and web application security. It also includes key elements for creating a comprehensive vulnerability scan report. Test your understanding of these critical cybersecurity concepts and tools.

    More Quizzes Like This

    Comptia GCGA Chapter 6 Flashcards
    57 questions
    CompTIA A+ 901 Flashcards
    13 questions
    TestOut CompTIA A+ Flashcards
    95 questions
    CompTIA Security+ Chapter 2 Flashcards
    19 questions
    Use Quizgecko on...
    Browser
    Browser