CySA+ Warm-up
Flashcard
•
Information Technology (IT)
•
Vocational training
•
Hard
Wayground Content
FREE Resource
Student preview

10 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Which data source best identifies lateral movement? Options: Firewall logs, DNS logs, NetFlow data, AV alerts, Email logs
Back
NetFlow data
Answer explanation
NetFlow data is best for identifying lateral movement as it captures detailed information about network traffic flows, allowing detection of unusual internal communications that indicate lateral movement within a network.
2.
FLASHCARD QUESTION
Front
What improves vulnerability prioritization most? Options: CVSS score, Asset value, Patch age, Scan frequency, Exploit PoC
Back
Asset value
Answer explanation
Asset value is crucial for vulnerability prioritization as it helps determine the potential impact of a vulnerability on critical assets. Higher asset value means prioritizing vulnerabilities that could cause significant harm.
3.
FLASHCARD QUESTION
Front
First step after detecting ransomware?
Back
Isolate systems
Answer explanation
The first step after detecting ransomware is to isolate systems. This prevents the malware from spreading to other devices and helps contain the threat, allowing for a more effective response and recovery process.
4.
FLASHCARD QUESTION
Front
Best indicator of credential misuse? Options: Hash match, Port scan, Impossible travel, File entropy, Malware signature
Back
Impossible travel
Answer explanation
Impossible travel is the best indicator of credential misuse as it suggests that a user has logged in from two geographically distant locations in a short time, which is highly unlikely and indicates potential unauthorized access.
5.
FLASHCARD QUESTION
Front
What makes threat intel actionable? Options: High volume, Free access, Relevance, Attribution, Automation
Back
Relevance
Answer explanation
Relevance is key to making threat intel actionable, as it ensures the information is pertinent to the specific context or threat landscape, allowing organizations to prioritize and respond effectively.
6.
FLASHCARD QUESTION
Front
Most reliable forensic evidence? Options: Log files, Disk image, Network captures, Memory dump, Screenshots
Back
Memory dump
Answer explanation
A memory dump captures the entire state of a system's RAM, providing critical information about running processes, open files, and system activity, making it the most reliable forensic evidence compared to other options.
7.
FLASHCARD QUESTION
Front
Purpose of UEBA?
Back
Behavior baselining
Answer explanation
UEBA (User and Entity Behavior Analytics) focuses on behavior baselining to identify anomalies in user and entity activities, making 'Behavior baselining' the correct choice. Other options do not align with UEBA's primary purpose.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
9 questions
Handbook
Flashcard
•
KG - University
5 questions
Cvc word game
Flashcard
•
KG - University
10 questions
Scholarships: How to Apply and Succeed
Flashcard
•
University
10 questions
Interview Skills
Flashcard
•
University
10 questions
Evolve 2 Unit - 11 Flashcard - 2
Flashcard
•
University
10 questions
DENR-CAR Environmental Flashcard (INTERMEDIATE ROUND)
Flashcard
•
KG
7 questions
Flashcardz Refroidissement
Flashcard
•
Professional Development
10 questions
Gujarati - viramchihn
Flashcard
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade