Adventures In CyberSecurity: CYSA+ CS0-002 Study Area

Chapter 3


Vulnerability Management is done through a formal process called Vulnerablity Assesment which works with another process called Risk Management.
Vulnerablility assesment identifies and assesses the vulnerablility.
Risk Management indentifies assets at risk and assigns a risk value derived from the liklihood and impact to each asset.

Assett Criticality describes the relative value of an asset to the organization

List at least one question that should be raised when determining an asset's criticality to an organization. Will we be able to recover the data in case of disater?
How long will it take to recover the data?
What is the effect of this downtime, including public standing?

Nessus Network Monitor is an example of what type of scanner? Passive

Describe the diffence between a false positive, true positive, false negative, and true negative

A Configuration Baseline is a set of security settings that are required on devices of various types

Place the patch management life cycle steps in order

What type of controls are implemted when encrypting sensitive data? Counter Measure or Compensating Control

List at least 2 hardening techniques.

Match the risk handling techniques with their definition

List at least one risk to scanning.

Define Key Terms

Chapter 2 Chapter 4 DJames617