CySA+ Warm-up

CySA+ Warm-up

Assessment

Flashcard

Information Technology (IT)

Vocational training

Hard

Created by

Wayground Content

FREE Resource

Student preview

quiz-placeholder

10 questions

Show all answers

1.

FLASHCARD QUESTION

Front

Which data source best identifies lateral movement? Options: Firewall logs, DNS logs, NetFlow data, AV alerts, Email logs

Back

NetFlow data

Answer explanation

NetFlow data is best for identifying lateral movement as it captures detailed information about network traffic flows, allowing detection of unusual internal communications that indicate lateral movement within a network.

2.

FLASHCARD QUESTION

Front

What improves vulnerability prioritization most? Options: CVSS score, Asset value, Patch age, Scan frequency, Exploit PoC

Back

Asset value

Answer explanation

Asset value is crucial for vulnerability prioritization as it helps determine the potential impact of a vulnerability on critical assets. Higher asset value means prioritizing vulnerabilities that could cause significant harm.

3.

FLASHCARD QUESTION

Front

First step after detecting ransomware?

Back

Isolate systems

Answer explanation

The first step after detecting ransomware is to isolate systems. This prevents the malware from spreading to other devices and helps contain the threat, allowing for a more effective response and recovery process.

4.

FLASHCARD QUESTION

Front

Best indicator of credential misuse? Options: Hash match, Port scan, Impossible travel, File entropy, Malware signature

Back

Impossible travel

Answer explanation

Impossible travel is the best indicator of credential misuse as it suggests that a user has logged in from two geographically distant locations in a short time, which is highly unlikely and indicates potential unauthorized access.

5.

FLASHCARD QUESTION

Front

What makes threat intel actionable? Options: High volume, Free access, Relevance, Attribution, Automation

Back

Relevance

Answer explanation

Relevance is key to making threat intel actionable, as it ensures the information is pertinent to the specific context or threat landscape, allowing organizations to prioritize and respond effectively.

6.

FLASHCARD QUESTION

Front

Most reliable forensic evidence? Options: Log files, Disk image, Network captures, Memory dump, Screenshots

Back

Memory dump

Answer explanation

A memory dump captures the entire state of a system's RAM, providing critical information about running processes, open files, and system activity, making it the most reliable forensic evidence compared to other options.

7.

FLASHCARD QUESTION

Front

Purpose of UEBA?

Back

Behavior baselining

Answer explanation

UEBA (User and Entity Behavior Analytics) focuses on behavior baselining to identify anomalies in user and entity activities, making 'Behavior baselining' the correct choice. Other options do not align with UEBA's primary purpose.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?