Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Exam (elaborations) CYSA2103

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
03-05-2024
Written in
2023/2024

What are the three key objectives of information security? - ANSWER Confidentiality, integrity, and availability Risk exists at the intersection of _______ and _________. - ANSWER Threats and vulnerabilities. What is the overall risk rating for a risk that has medium likelihood and high impact? - ANSWER High What type of system controls access to a network based on criteria such as time of day, location, device type, and system - ANSWER Network access control What are the three networks typically connected to a triple-homed firewall? - ANSWER The Internet, an internal network, and a DMZ What is the TCP port for the HTTP protocol? - ANSWER 80 What is the TCP port for the HTTPS protocol? - ANSWER 443 What are the four types of firewalls? - ANSWER Packet filters, stateful inspection firewalls, next-generation firewalls, and web application firewalls. ______ may be used to apply settings to many different Windows systems at the same time. - ANSWER Group Policy Objects (GPOs) What are the four phases of penetration testing? - ANSWER Planning, Discovery, Attack, and Reporting

Show more Read less
Institution
Course

Content preview

CYSA EXAM
2023LATEST
UPDATE VERIFIED
SOLUTIONS
What are the three key objectives of information security? - ANSWER Confidentiality,
integrity, and availability

Risk exists at the intersection of _______ and _________. - ANSWER Threats and
vulnerabilities.

What is the overall risk rating for a risk that has medium likelihood and high impact? -
ANSWER High

What type of system controls access to a network based on criteria such as time of day,
location, device type, and system - ANSWER Network access control

What are the three networks typically connected to a triple-homed firewall? - ANSWER
The Internet, an internal network, and a DMZ

What is the TCP port for the HTTP protocol? - ANSWER 80

What is the TCP port for the HTTPS protocol? - ANSWER 443

What are the four types of firewalls? - ANSWER Packet filters, stateful inspection
firewalls, next-generation firewalls, and web application firewalls.

______ may be used to apply settings to many different Windows systems at the same
time. - ANSWER Group Policy Objects (GPOs)

What are the four phases of penetration testing? - ANSWER Planning, Discovery,
Attack, and Reporting

, What type of software can you use to enumerate the services that are accepting
network connections on a remote system - ANSWER Port scanner

What is the range of well-known ports? - ANSWER 0-1023

What is the range of registered ports? - ANSWER 1024-49151

What is the most commonly used port scanner? - ANSWER nmap

What Cisco logging level indicates a critical event? - ANSWER 2

What service is responsible for resolving domain names to IP addresses? - ANSWER
DNS

What tool can be used to determine the path between two systems over the Internet? -
ANSWER Traceroute or tracert, depending on the operating system

What service allows you to look up the registered owner of a domain name? -
ANSWER Whois

What type of data analysis looks for differences from expected behaviors? - ANSWER
Anomaly analysis

What type of data analysis predicts threats based on existing data? - ANSWER Trend
analysis

What regulation requires vulnerability scans for organizations involved in credit card
processing? - ANSWER PCI DSS

What regulation requires vulnerability scanning for federal government agencies? -
ANSWER FISMA

What type of vulnerability scan leverages read-only access to the scan target? -
ANSWER Credentialed scan

What term is used to describe an organization's willingness to tolerate risk? - ANSWER
Risk appetite

What type of account should be used to perform credentialed vulnerability scans? -
ANSWER Read-only account

What function is performed by QualysGuard, Nessus, Nexpose, and OpenVAS? -
ANSWER Vulnerability scanning

What is the purpose of Nikto and Acunetix? - ANSWER Web application scanning

Written for

Course

Document information

Uploaded on
May 3, 2024
Number of pages
8
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$11.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
leonardkinyua2

Get to know the seller

Seller avatar
leonardkinyua2 (self)
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
2 year
Number of followers
0
Documents
12
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions