QUESTIONS WITH SOLUTIONS GRADED A+
◉ Compliance is a critical subcomponent of: Answer: Security
◉ CIST Cyber Security Framework (CSF) Core Functions. Answer:
Identify, Protect, Detect. Respond and Recover
◉ Executive Communicate: Answer: Mission priorities, avaliable
resources, and overall risk tolerances
◉ Businesses/Process Communicate: Answer: Input into the risk
management process and collaborates with implementation
◉ Implementation/Operations Communicate: Answer: Communicates
profile implementation profile
◉ Do preventative controls fail? Answer: Yes, in the face of a persistent
adversary
◉ Purple Teaming. Answer: Red and Blue
, ◉ Governance. Answer: What is the overall stance on defending against
cybersecurity? Is the focus compliance or defending against APT's?
◉ Operations. Answer: How integrated is cybersecurity staff? Are
proactive controls in place or are they reactive?
◉ Architecture and Engineering. Answer: How well defined and
integrated with mission operations are the organizations security
architecture? Are capabilities focused on some or all of the CSF?
◉ ATT&CK. Answer: (Adversarial Tactics, Techniques, and Common
Knowledge) A knowledge base maintained by the MITRE Corporation
for listing and explaining specific adversary tactics, techniques, and
procedures.
◉ Tool: Navigator. Answer: Open source tool to visualize attacker
tactics, techniques, and procedures (TTP) to identify how your defenses
are doing against the ATT&CK matrix.
◉ Tool: DETT&CT. Answer: Open source tool that visualizes the
connections to ATT&CK
◉ Pivot. Answer: An attack from one system to another