Podcast
Questions and Answers
What best describes an attack vector?
What best describes an attack vector?
- A specific path by which a threat actor gains unauthorized access to a system (correct)
- A report detailing the findings of a security assessment
- A type of hardware used in cybersecurity efforts
- A method for securing a network against intrusions
Which of the following is NOT a type of attack vector?
Which of the following is NOT a type of attack vector?
- Cyber
- Environmental (correct)
- Physical
- Human
What does the term 'likelihood' refer to in the context of threat assessment?
What does the term 'likelihood' refer to in the context of threat assessment?
- The chance of a threat being realized, usually expressed as a percentage (correct)
- The frequency of vulnerabilities being exploited
- The time it takes to respond to a security incident
- The total cost incurred from a security breach
What is the primary goal of threat hunting in cybersecurity?
What is the primary goal of threat hunting in cybersecurity?
How is 'impact' defined in a threat assessment scenario?
How is 'impact' defined in a threat assessment scenario?
What is the primary responsibility of a Cybersecurity Manager/Administrator?
What is the primary responsibility of a Cybersecurity Manager/Administrator?
Which role is primarily concerned with the creation of tools and techniques for cybersecurity?
Which role is primarily concerned with the creation of tools and techniques for cybersecurity?
Who is responsible for directing the overall cybersecurity strategy of an organization?
Who is responsible for directing the overall cybersecurity strategy of an organization?
What distinguishes a Cybersecurity Engineer from a Cybersecurity Manager?
What distinguishes a Cybersecurity Engineer from a Cybersecurity Manager?
Which of the following roles likely has the highest level of responsibility in an organization?
Which of the following roles likely has the highest level of responsibility in an organization?
What should you do if you believe you’ve completed everything but still do not see a 100% completion rate?
What should you do if you believe you’ve completed everything but still do not see a 100% completion rate?
What is the result of receiving a course completion letter?
What is the result of receiving a course completion letter?
Who is responsible for the hands-on configuration of a system in cybersecurity?
Who is responsible for the hands-on configuration of a system in cybersecurity?
How can learners ask questions regarding the course or concepts they do not understand?
How can learners ask questions regarding the course or concepts they do not understand?
Which of the following statements is true regarding the 60-Day 100% Pass Guarantee?
Which of the following statements is true regarding the 60-Day 100% Pass Guarantee?
Which role primarily involves direct action in configuring cybersecurity systems?
Which role primarily involves direct action in configuring cybersecurity systems?
What action should be taken if a concept within the course is unclear?
What action should be taken if a concept within the course is unclear?
What type of company is Dion Training Solutions in relation to CompTIA?
What type of company is Dion Training Solutions in relation to CompTIA?
Which of the following describes a preventative control?
Which of the following describes a preventative control?
What is the main purpose of a detective control?
What is the main purpose of a detective control?
Which statement about corrective controls is correct?
Which statement about corrective controls is correct?
What does the efficiency of a security control measure?
What does the efficiency of a security control measure?
Which of the following is NOT a function of a preventative control?
Which of the following is NOT a function of a preventative control?
Which type of control focuses on access denial?
Which type of control focuses on access denial?
What role do physical controls play in security?
What role do physical controls play in security?
Which of the following is an example of a corrective control?
Which of the following is an example of a corrective control?
What is a primary purpose of Open-Source Intelligence (OSINT)?
What is a primary purpose of Open-Source Intelligence (OSINT)?
Which of the following could be considered a source of OSINT?
Which of the following could be considered a source of OSINT?
Which of these is NOT a potential method for gathering OSINT?
Which of these is NOT a potential method for gathering OSINT?
In the context of OSINT, what type of information can be gathered from dating sites?
In the context of OSINT, what type of information can be gathered from dating sites?
Which technique can be used to aggregate OSINT effectively?
Which technique can be used to aggregate OSINT effectively?
What is the purpose of Structured Threat Information eXpression (STIX)?
What is the purpose of Structured Threat Information eXpression (STIX)?
In what format is STIX expressed?
In what format is STIX expressed?
Which of the following is NOT a high-level STIX domain object (SDO)?
Which of the following is NOT a high-level STIX domain object (SDO)?
Which version of STIX does the exam focus on?
Which version of STIX does the exam focus on?
What are attribute-value pairs used for in STIX?
What are attribute-value pairs used for in STIX?
Which of the following best describes the relationship features of STIX?
Which of the following best describes the relationship features of STIX?
Which of the following attributes can be found in a high-level STIX domain object?
Which of the following attributes can be found in a high-level STIX domain object?
What aspect of STIX is emphasized in the exam preparation?
What aspect of STIX is emphasized in the exam preparation?
Flashcards
Cybersecurity Specialist/Technician
Cybersecurity Specialist/Technician
A cybersecurity professional who configures systems and performs tasks under the direction of a cybersecurity manager.
Vulnerability Response
Vulnerability Response
A role responsible for identifying and responding to vulnerabilities within a system.
Vulnerability Management
Vulnerability Management
The process of managing and controlling the identified vulnerabilities within a system or network.
Vulnerability Handling
Vulnerability Handling
Signup and view all the flashcards
Vulnerability Remediation
Vulnerability Remediation
Signup and view all the flashcards
60-Day 100% Pass Guarantee
60-Day 100% Pass Guarantee
Signup and view all the flashcards
Core Cybersecurity Roles
Core Cybersecurity Roles
Signup and view all the flashcards
Signup and view all the flashcards
Cybersecurity Manager/Administrator
Cybersecurity Manager/Administrator
Signup and view all the flashcards
Cybersecurity Engineer
Cybersecurity Engineer
Signup and view all the flashcards
Chief Information Security Officer (CISO)
Chief Information Security Officer (CISO)
Signup and view all the flashcards
Attack Vector
Attack Vector
Signup and view all the flashcards
Types of Attack Vectors
Types of Attack Vectors
Signup and view all the flashcards
Likelihood (Security)
Likelihood (Security)
Signup and view all the flashcards
Impact (Security)
Impact (Security)
Signup and view all the flashcards
Threat Hunting
Threat Hunting
Signup and view all the flashcards
Preventative Control
Preventative Control
Signup and view all the flashcards
Detective Control
Detective Control
Signup and view all the flashcards
Corrective Control
Corrective Control
Signup and view all the flashcards
Physical Control
Physical Control
Signup and view all the flashcards
Security Control Efficiency
Security Control Efficiency
Signup and view all the flashcards
NIST SP 800-53
NIST SP 800-53
Signup and view all the flashcards
Family Designations in NIST SP 800-53
Family Designations in NIST SP 800-53
Signup and view all the flashcards
Familiarity with NIST SP 800-53 Concepts
Familiarity with NIST SP 800-53 Concepts
Signup and view all the flashcards
Open-Source Intelligence (OSINT)
Open-Source Intelligence (OSINT)
Signup and view all the flashcards
How OSINT assists attackers
How OSINT assists attackers
Signup and view all the flashcards
Publicly Available Information
Publicly Available Information
Signup and view all the flashcards
OSINT from Social Media
OSINT from Social Media
Signup and view all the flashcards
Metadata in OSINT
Metadata in OSINT
Signup and view all the flashcards
STIX (Structured Threat Information eXpression)
STIX (Structured Threat Information eXpression)
Signup and view all the flashcards
STIX format
STIX format
Signup and view all the flashcards
STIX Domain Objects (SDO)
STIX Domain Objects (SDO)
Signup and view all the flashcards
STIX Observed Data
STIX Observed Data
Signup and view all the flashcards
STIX Indicator
STIX Indicator
Signup and view all the flashcards
STIX Attack Pattern
STIX Attack Pattern
Signup and view all the flashcards
STIX Campaign and Threat Actors
STIX Campaign and Threat Actors
Signup and view all the flashcards
STIX Course of Action (COA)
STIX Course of Action (COA)
Signup and view all the flashcards