Computer Science > QUESTIONS & ANSWERS > CompTIA Cybersecurity Analyst (CySA+) - Module 4: Security Architecture and Tool Sets (All)

CompTIA Cybersecurity Analyst (CySA+) - Module 4: Security Architecture and Tool Sets

Document Content and Description Below

CompTIA Cybersecurity Analyst (CySA+) - Module 4: Security Architecture and Tool Sets Which framework was designed to widen the focus of an organization to overall architecture? COBIT TOGAF SA... BSA ITIL -Answer- TOGAF (The Open Group Architecture Framework) The procedures in place to test controls need to be examined only by internal parties to ensure security. True False -Answer- False Which policies are responsible for securing employee profiles? Account Management Policy Acceptable Use Policy Data Ownership Policy Password Policy -Answer- Account Management Policy & Password Policy Which type of control would a software in charge of managing who has access to the network be? Administrative Control Defined Parameters Logical Control Physical Control -Answer- Logical Control Audits should be done by a third party to get a more accurate result. True False -Answer- True What type of verification method is based on a judgement call? Assessments Audit Evaluation Certification -Answer- Evaluation Which framework is distinguished by focusing exclusively on IT security? NIST TOGAF ISO ITIL -Answer- NIST (National Institute of Standards and Technology) What procedure is responsible for supplementing a lack of controls? Patching Managing Exceptions Control Testing Procedures Compensation Control Development -Answer- Compensation Control Development Which policy might govern how guests may use the companies WiFi? Data Retention Policy Account Management Policy Acceptable Use Policy Data Ownership Policy -Answer- Acceptable Use Policy A guideline is an adamant step by step listing of actions to be completed for a given task. True False -Answer- False In which procedure is everyone in the company told how to react and alert proper members of staff? Evidence Production Continuous Monitoring Remediation Plans Managing Exceptions -Answer- Evidence Production [Show More]

Last updated: 1 year ago

Preview 1 out of 9 pages

Add to cart

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

We Accept:

We Accept

Also available in bundle (1)

CySA Bundled Exams with complete solution; Everything you need is here.

CySA+ 231 More Questions with 100% Correct Answers CySA+ 2022 Questions and Answers with complete solution CySA+ Final - Study Guide 2022 with complete solution Final SAS study guide Question...

By Professor Lynne 1 year ago

$18

17  

Reviews( 0 )

$9.00

Add to cart

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
85
0

Document information


Connected school, study & course


About the document


Uploaded On

Sep 05, 2022

Number of pages

9

Written in

Seller


seller-icon
Professor Lynne

Member since 3 years

343 Documents Sold


Additional information

This document has been written for:

Uploaded

Sep 05, 2022

Downloads

 0

Views

 85

Document Keyword Tags

More From Professor Lynne

View all Professor Lynne's documents »
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·