Home > Store

CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide Premium Edition and Practice Test, 2nd Edition

CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide Premium Edition and Practice Test, 2nd Edition

Premium Edition eBook

  • Your Price: $47.99
  • List Price: $59.99
  • About Premium Edition eBooks
  • The Premium Edition eBook and Practice Test is a digital-only certification preparation product combining an eBook with enhanced Pearson IT Certification Practice Tests. Click on the "Premium Edition" tab (on the left side of this page) to learn more about this product.

    Your purchase will deliver:

    • Link to download the enhanced Pearson IT Certification Practice Test exam engine
    • Access code for question database
    • eBook in the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    MOBI MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.

    Adobe Reader PDF The popular standard, used most often with the free Adobe® Reader® software.

    The eBooks require no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

    Watermarked eBook FAQ

    eBook Download Instructions

Also available in other formats.

Register your product to gain access to bonus material or receive a coupon.

Description

  • Copyright 2021
  • Edition: 2nd
  • Premium Edition eBook
  • ISBN-10: 0-13-674712-4
  • ISBN-13: 978-0-13-674712-3

The exciting new CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide Premium Edition eBook and Practice Test is a digital-only certification preparation product combining an eBook with enhanced Pearson Test Prep practice test software. The Premium Edition eBook and Practice Test contains the following items:

* The CompTIA Cybersecurity Analyst (CySA+) CS0-002 Premium Edition Practice Test, including four full practice exams and enhanced practice test features
* PDF and EPUB formats of the CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide from Pearson IT Certification, which are accessible via your PC, tablet, and smartphone


About the Premium Edition Practice Test

This Premium Edition contains an enhanced version of the Pearson Test Prep practice test software with four full practice exams. In addition, it contains all the chapter-opening assessment questions from the book. This integrated learning package

* Allows you to focus on individual topic areas or take complete, timed exams
* Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions
* Provides unique sets of exam-realistic practice questions
* Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most


Pearson Test Prep Practice Test software minimum system requirements:

Pearson Test Prep online system requirements:

Browsers: Chrome version 73 and above; Safari version 12 and above; Microsoft Edge 44 and above. Devices: Desktop and laptop computers, tablets running on Android v8.0 and iOS v13, smartphones with a minimum screen size of 4.7". Internet access required.


Pearson Test Prep offline system requirements:

Windows 10, Windows 8.1; Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases
 
About the Premium Edition eBook

Learn, prepare, and practice for CompTIA Cybersecurity Analyst (CySA+) CS0-002 exam success with this Cert Guide from Pearson IT Certification, a leader in IT certification learning.

Master the CompTIA Cybersecurity Analyst (CySA+) CS0-002 exam topics:

* Assess your knowledge with chapter-ending quizzes
* Review key concepts with exam preparation tasks
* Practice with realistic exam questions
* Get practical guidance for next steps and more advanced certifications


CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide is a best-of-breed exam study guide. Leading IT certification instructor Troy McMillan shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.

CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan.


Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this study guide helps you master the concepts and techniques that will allow you to succeed on the exam the first time.

The study guide helps you master all the topics on the CompTIA Cybersecurity Analyst (CySA+) CS0-002 exam, including
* Vulnerability management activities
* Implementing controls to mitigate attacks and software vulnerabilities
* Security solutions for infrastructure management
* Software and hardware assurance best practices
* Understanding and applying the appropriate incident response
* Applying security concepts in support of organizational risk mitigation


Sample Content

Table of Contents

Introduction xxxvii

Chapter 1 The Importance of Threat Data and Intelligence 3

Do I Know This Already? Quiz 3

Foundation Topics 6

Intelligence Sources 6

    Open-Source Intelligence 6

    Proprietary/Closed-Source Intelligence 6

    Timeliness 7

    Relevancy 7

    Confidence Levels 7

    Accuracy 7

Indicator Management 7

    Structured Threat Information eXpression (STIX) 8

    Trusted Automated eXchange of Indicator Information (TAXII) 8

    OpenIOC 9

Threat Classification 9

    Known Threat vs. Unknown Threat 10

    Zero-day 10

    Advanced Persistent Threat 11

Threat Actors 12

    Nation-state 12

    Organized Crime 12

    Terrorist Groups 12

    Hacktivist 12

    Insider Threat 12

Intelligence Cycle 13

Commodity Malware 14

Information Sharing and Analysis Communities 15

Exam Preparation Tasks 16

Chapter 2 Utilizing Threat Intelligence to Support Organizational Security 19

Do I Know This Already? Quiz 19

Foundation Topics 21

Attack Frameworks 21

    MITRE ATT&CK 21

    The Diamond Model of Intrusion Analysis 22

    Kill Chain 23

Threat Research 23

    Reputational 24

    Behavioral 24

    Indicator of Compromise (IoC) 25

    Common Vulnerability Scoring System (CVSS) 25

Threat Modeling Methodologies 29

    Adversary Capability 29

    Total Attack Surface 31

    Attack Vector 31

    Impact 32

    Probability 32

Threat Intelligence Sharing with Supported Functions 33

    Incident Response 33

    Vulnerability Management 33

    Risk Management 33

    Security Engineering 33

    Detection and Monitoring 34

Exam Preparation Tasks 34

Chapter 3 Vulnerability Management Activities 39

Do I Know This Already? Quiz 39

Foundation Topics 41

Vulnerability Identification 41

    Asset Criticality 42

    Active vs. Passive Scanning 43

    Mapping/Enumeration 44

Validation 44

Remediation/Mitigation 45

    Configuration Baseline 45

    Patching 46

    Hardening 46

    Compensating Controls 47

    Risk Acceptance 47

    Verification of Mitigation 47

Scanning Parameters and Criteria 49

    Risks Associated with Scanning Activities 49

    Vulnerability Feed 49

    Scope 49

    Credentialed vs. Non-credentialed 51

    Server-based vs. Agent-based 52

    Internal vs. External 53

    Special Considerations 53

Inhibitors to Remediation 62

Exam Preparation Tasks 63

Chapter 4 Analyzing Assessment Output 67

Do I Know This Already? Quiz 67

Foundation Topics 69

Web Application Scanner 69

    Burp Suite 69

    OWASP Zed Attack Proxy (ZAP) 69

    Nikto 70

    Arachni 70

Infrastructure Vulnerability Scanner 71

    Nessus 71

    OpenVAS 71

Software Assessment Tools and Techniques 72

    Static Analysis 73

    Dynamic Analysis 74

    Reverse Engineering 75

    Fuzzing 75

Enumeration 76

    Nmap 76

    Host Scanning 79

    hping 80

    Active vs. Passive 82

    Responder 82

Wireless Assessment Tools 82

    Aircrack-ng 83

    Reaver 84

    oclHashcat 86

Cloud Infrastructure Assessment Tools 86

    ScoutSuite 87

    Prowler 87

    Pacu 87

Exam Preparation Tasks 88

Chapter 5 Threats and Vulnerabilities Associated with Specialized Technology 93

Do I Know This Already? Quiz 93

Foundation Topics 97

Mobile 97

    Unsigned Apps/System Apps 98

    Security Implications/Privacy Concerns 99

    Device Loss/Theft 100

    Rooting/Jailbreaking 100

    Push Notification Services 100

    Geotagging 100

    OEM/Carrier Android Fragmentation 101

    Mobile Payment 101

    USB 102

    Malware 102

    Unauthorized Domain Bridging 103

    SMS/MMS/Messaging 103

Internet of Things (IoT) 103

    IoT Examples 104

    Methods of Securing IoT Devices 104

Embedded Systems 105

Real-Time Operating System (RTOS) 105

System-on-Chip (SoC) 105

Field Programmable Gate Array (FPGA) 105

Physical Access Control 106

    Systems 106

    Devices 107

    Facilities 107

Building Automation Systems 109

    IP Video 109

    HVAC Controllers 111

    Sensors 111

Vehicles and Drones 111

    CAN Bus 112

    Drones 113

Workflow and Process Automation Systems 113

Incident Command System (ICS) 114

Supervisory Control and Data Acquisition (SCADA) 114

    Modbus 118

Exam Preparation Tasks 118

Chapter 6 Threats and Vulnerabilities Associated with Operating in the Cloud 123

Do I Know This Already? Quiz 123

Foundation Topics 126

Cloud Deployment Models 126

Cloud Service Models 127

Function as a Service (FaaS)/Serverless Architecture 128

Infrastructure as Code (IaC) 130

Insecure Application Programming Interface (API) 131

Improper Key Management 132

    Key Escrow 133

    Key Stretching 134

Unprotected Storage 134

    Transfer/Back Up Data to Uncontrolled Storage 134

    Big Data 135

Logging and Monitoring 136

    Insufficient Logging and Monitoring 136

    Inability to Access 136

Exam Preparation Tasks 137

Chapter 7 Implementing Controls to Mitigate Attacks and Software Vulnerabilities 141

Do I Know This Already? Quiz 141

Foundation Topics 143

Attack Types 143

    Extensible Markup Language (XML) Attack 143

    Structured Query Language (SQL) Injection 145

    Overflow Attacks 147

    Remote Code Execution 150

    Directory Traversal 151

    Privilege Escalation 152

    Password Spraying 152

    Credential Stuffing 152

    Impersonation 154

    Man-in-the-Middle Attack 154

    Session Hijacking 158

    Rootkit 159

    Cross-Site Scripting 160

Vulnerabilities 163

    Improper Error Handling 163

    Dereferencing 163

    Insecure Object Reference 163

    Race Condition 164

    Broken Authentication 164

    Sensitive Data Exposure 165

    Insecure Components 165

    Insufficient Logging and Monitoring 166

    Weak or Default Configurations 167

    Use of Insecure Functions 168

Exam Preparation Tasks 169

Chapter 8 Security Solutions for Infrastructure Management 173

Do I Know This Already? Quiz 173

Foundation Topics 177

Cloud vs. On-premises 177

    Cloud Mitigations 177

Asset Management 178

    Asset Tagging 178

    Device-Tracking Technologies 178

    Object-Tracking and Object-Containment Technologies 179

Segmentation 180

    Physical 180

    Virtual 182

    Jumpbox 183

    System Isolation 184

Network Architecture 185

    Physical 186

    Software-Defined Networking 193

    Virtual Private Cloud (VPC) 195

    Virtual Private Network (VPN) 195

    Serverless 200

Change Management 201

Virtualization 201

    Security Advantages and Disadvantages of Virtualization 201

    Type 1 vs. Type 2 Hypervisors 203

    Virtualization Attacks and Vulnerabilities 203

    Virtual Networks 205

    Management Interface 205

    Vulnerabilities Associated with a Single Physical Server Hosting Multiple Companies Virtual Machines 206

    Vulnerabilities Associated with a Single Platform Hosting Multiple Companies Virtual Machines 207

    Virtual Desktop Infrastructure (VDI) 207

    Terminal Services/Application Delivery Services 208

Containerization 208

Identity and Access Management 209

    Identify Resources 210

    Identify Users 210

    Identify Relationships Between Resources and Users 210

    Privilege Management 211

    Multifactor Authentication (MFA) 211

    Single Sign-On (SSO) 214

    Active Directory 217

    SESAME 219

    Federation 219

    Role-Based Access Control 224

    Attribute-Based Access Control 225

    Mandatory Access Control 228

    Manual Review 229

Cloud Access Security Broker (CASB) 229

Honeypot 230

Monitoring and Logging 230

    Log Management 230

    Audit Reduction Tools 231

    NIST SP 800-137 232

Encryption 232

    Cryptographic Types 233

    Hashing Functions 238

    Message Digest Algorithm 239

    Transport Encryption 240

Certificate Management 242

    Certificate Authority and Registration Authority 243

    Certificates 243

    Certificate Revocation List 244

    OCSP 244

    PKI Steps 245

    Cross-Certification 245

    Digital Signatures 245

Active Defense 246

    Hunt Teaming 247

Exam Preparation Tasks 247

Chapter 9 Software Assurance Best Practices 253

Do I Know This Already? Quiz 253

Foundation Topics 256

Platforms 256

    Mobile 256

    Web Application 260

    Client/Server 263

    Embedded 263

    System-on-Chip (SoC) 265

    Firmware 266

Software Development Life Cycle (SDLC) Integration 267

    Step 1: Plan/Initiate Project 267

    Step 2: Gather Requirements 268

    Step 3: Design 268

    Step 4: Develop 269

    Step 5: Test/Validate 269

    Step 6: Release/Maintain 269

    Step 7: Certify/Accredit 270

    Step 8: Change Management and Configuration Management/Replacement 270

DevSecOps 270

    DevOps 270

Software Assessment Methods 272

    User Acceptance Testing 272

    Stress Test Application 272

    Security Regression Testing 273

    Code Review 273

    Security Testing 274

    Code Review Process 275

Secure Coding Best Practices 275

    Input Validation 275

    Output Encoding 276

    Session Management 276

    Authentication 277

    Data Protection 285

    Parameterized Queries 285

Static Analysis Tools 286

Dynamic Analysis Tools 286

Formal Methods for Verification of Critical Software 286

Service-Oriented Architecture 287

    Security Assertions Markup Language (SAML) 287

    Simple Object Access Protocol (SOAP) 287

    Representational State Transfer (REST) 288

    Microservices 288

Exam Preparation Tasks 289

Chapter 10 Hardware Assurance Best Practices 295

Do I Know This Already? Quiz 295

Foundation Topics 298

Hardware Root of Trust 298

    Trusted Platform Module(TPM) 299

    Virtual TPM 300

    Hardware Security Module (HSM) 302

    MicroSD HSM 302

eFuse 303

Unified Extensible Firmware Interface (UEFI) 303

Trusted Foundry 304

Secure Processing 305

    Trusted Execution 305

    Secure Enclave 307

    Processor Security Extensions 307

    Atomic Execution 307

Anti-Tamper 308

Self-Encrypting Drives 308

Trusted Firmware Updates 308

Measured Boot and Attestation 310

    Measured Launch 311

    Integrity Measurement Architecture 311

Bus Encryption 311

Exam Preparation Tasks 312

Chapter 11 Analyzing Data as Part of Security Monitoring Activities 317

Do I Know This Already? Quiz 317

Foundation Topics 320

Heuristics 320

Trend Analysis 320

Endpoint 321

    Malware 323

    Memory 329

    System and Application Behavior 333

    File System 339

    User and Entity Behavior Analytics (UEBA) 341

Network 342

    Uniform Resource Locator (URL) and Domain Name System (DNS) Analysis 342

    DNS Analysis 342

    Domain Generation Algorithm 343

    Flow Analysis 345

    NetFlow Analysis 346

    Packet and Protocol Analysis 348

    Malware 348

Log Review 348

    Event Logs 349

    Syslog 350

    Kiwi Syslog Server 352

    Firewall Logs 353

    Web Application Firewall (WAF) 355

    Proxy 356

    Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) 357

Impact Analysis 361

    Organization Impact vs. Localized Impact 361

    Immediate Impact vs. Total Impact 361

Security Information and Event Management (SIEM) Review 361

    Rule Writing 362

    Known-Bad Internet Protocol (IP) 363

    Dashboard 363

Query Writing 366

    String Search 366

    Script 366

    Piping 367

E-mail Analysis 367

    E-mail Spoofing 368

    Malicious Payload 368

    Domain Keys Identified Mail (DKIM) 368

    Sender Policy Framework (SPF) 369

    Domain-based Message Authentication, Reporting, and Conformance (DMARC) 369

    Phishing 369

    Forwarding 370

    Digital Signature 371

    E-mail Signature Block 372

    Embedded Links 372

    Impersonation 372

Exam Preparation Tasks 372

Chapter 12 Implementing Configuration Changes to Existing Controls to Improve Security 377

Do I Know This Already? Quiz 377

Foundation Topics 381

Permissions 381

Whitelisting and Blacklisting 381

    Application Whitelisting and Blacklisting 382

    Input Validation 382

Firewall 383

    NextGen Firewalls 383

    Host-Based Firewalls 384

Intrusion Prevention System (IPS) Rules 386

Data Loss Prevention (DLP) 386

Endpoint Detection and Response (EDR) 387

Network Access Control (NAC) 387

    Quarantine/Remediation 389

    Agent-Based vs. Agentless NAC 389

    802.1X 389

Sinkholing 391

Malware Signatures 391

    Development/Rule Writing 392

Sandboxing 392

Port Security 394

    Limiting MAC Addresses 395

    Implementing Sticky MAC 395

Exam Preparation Tasks 396

Chapter 13 The Importance of Proactive Threat Hunting 401

Do I Know This Already? Quiz 401

Foundation Topics 404

Establishing a Hypothesis 404

Profiling Threat Actors and Activities 405

Threat Hunting Tactics 406

    Hunt Teaming 406

    Threat Model 406

    Executable Process Analysis 407

    Memory Consumption 409

Reducing the Attack Surface Area 409

    System Hardening 410

    Configuration Lockdown 410

Bundling Critical Assets 411

    Commercial Business Classifications 411

    Military and Government Classifications 412

    Distribution of Critical Assets 412

Attack Vectors 412

Integrated Intelligence 413

Improving Detection Capabilities 413

    Continuous Improvement 413

    Continuous Monitoring414

Exam Preparation Tasks 414

Chapter 14 Automation Concepts and Technologies 419

Do I Know This Already? Quiz 419

Foundation Topics 422

Workflow Orchestration 422

Scripting 423

Application Programming Interface (API) Integration 424

Automated Malware Signature Creation 424

Data Enrichment 425

Threat Feed Combination 426

Machine Learning 426

Use of Automation Protocols and Standards 427

    Security Content Automation Protocol (SCAP) 427

Continuous Integration 428

Continuous Deployment/Delivery 428

Exam Preparation Tasks 429

Chapter 15 The Incident Response Process 433

Do I Know This Already? Quiz 433

Foundation Topics 435

Communication Plan 435

    Limiting Communication to Trusted Parties 435

    Disclosing Based on Regulatory/Legislative Requirements 435

    Preventing Inadvertent Release of Information 435

    Using a Secure Method of Communication 435

    Reporting Requirements 436

Response Coordination with Relevant Entities 436

    Legal 436

    Human Resources 437

    Public Relations 437

    Internal and External 437

    Law Enforcement 437

    Senior Leadership 438

    Regulatory Bodies 438

Factors Contributing to Data Criticality 439

    Personally Identifiable Information (PII) 439

    Personal Health Information (PHI) 440

    Sensitive Personal Information (SPI) 441

    High Value Assets 441

    Financial Information 441

    Intellectual Property 442

    Corporate Information 444

Exam Preparation Tasks 445

Chapter 16 Applying the Appropriate Incident Response Procedure 449

Do I Know This Already? Quiz 449

Foundation Topics 452

Preparation 452

    Training 452

    Testing 453

    Documentation of Procedures 453

Detection and Analysis 454

    Characteristics Contributing to Severity Level Classification 455

    Downtime and Recovery Time 455

    Data Integrity 456

    Economic 456

    System Process Criticality 457

    Reverse Engineering 457

    Data Correlation 458

Containment 458

    Segmentation 458

    Isolation 459

Eradication and Recovery 459

    Vulnerability Mitigation 459

    Sanitization 460

    Reconstruction/Reimaging 460

    Secure Disposal 460

    Patching 461

    Restoration of Permissions 461

    Reconstitution of Resources 462

    Restoration of Capabilities and Services 462

    Verification of Logging/Communication to Security Monitoring 462

Post-Incident Activities 463

    Evidence Retention 463

    Lessons Learned Report 463

    Change Control Process 464

    Incident Response Plan Update 464

    Incident Summary Report 464

    Indicator of Compromise (IoC) Generation 465

    Monitoring 465

Exam Preparation Tasks 465

Chapter 17 Analyzing Potential Indicators of Compromise 469

Do I Know This Already? Quiz 469

Foundation Topics 472

Network-Related Indicators of Compromise 472

    Bandwidth Consumption472

    Beaconing 473

    Irregular Peer-to-Peer Communication 473

    Rogue Device on the Network 475

    Scan/Sweep 476

    Unusual Traffic Spike 476

    Common Protocol over Non-standard Port 476

Host-Related Indicators of Compromise 477

    Processor Consumption 477

    Memory Consumption 477

    Drive Capacity Consumption 477

    Unauthorized Software 477

    Malicious Process 478

    Unauthorized Change 479

    Unauthorized Privilege 479

    Data Exfiltration 479

    Abnormal OS Process Behavior 479

    File System Change or Anomaly 479

    Registry Change or Anomaly 480

    Unauthorized Scheduled Task 480

Application-Related Indicators of Compromise 480

    Anomalous Activity 480

    Introduction of New Accounts 480

    Unexpected Output 480

    Unexpected Outbound Communication 481

    Service Interruption 481

    Application Log 481

Exam Preparation Tasks 482

Chapter 18 Utilizing Basic Digital Forensics Techniques 485

Do I Know This Already? Quiz 485

Foundation Topics 488

Network 488

    Wireshark 488

    tcpdump 490

Endpoint 490

    Disk 491

    Memory 493

Mobile 494

Cloud 495

Virtualization 497

Legal Hold 497

Procedures 497

    EnCase Forensic 498

    Sysinternals 498

    Forensic Investigation Suite 498

Hashing 499

    Hashing Utilities 499

    Changes to Binaries 500

Carving 500

Data Acquisition 501

Exam Preparation Tasks 501

Chapter 19 The Importance of Data Privacy and Protection 505

Do I Know This Already? Quiz 505

Foundation Topics 508

Privacy vs. Security 508

Non-technical Controls 508

    Classification 508

    Ownership 508

    Retention 509

    Data Types 509

    Retention Standards 510

    Confidentiality 510

    Legal Requirements 510

    Data Sovereignty 514

    Data Minimization 515

    Purpose Limitation 515

    Non-disclosure agreement (NDA) 516

Technical Controls 516

    Encryption 516

    Data Loss Prevention (DLP) 516

    Data Masking 516

    Deidentification 517

    Tokenization 517

    Digital Rights Management (DRM) 517

    Geographic Access Requirements 521

    Access Controls 521

Exam Preparation Tasks 521

Chapter 20 Applying Security Concepts in Support of Organizational Risk Mitigation 527

Do I Know This Already? Quiz 527

Foundation Topics 530

Business Impact Analysis 530

    Identify Critical Processes and Resources 530

    Identify Outage Impacts and Estimate Downtime 531

    Identify Resource Requirements 531

    Identify Recovery Priorities 531

Risk Identification Process 532

    Make Risk Determination Based upon Known Metrics 533

    Qualitative Risk Analysis 533

    Quantitative Risk Analysis 534

Risk Calculation 534

    Probability 535

    Magnitude 535

Communication of Risk Factors 536

Risk Prioritization 537

    Security Controls 538

    Engineering Tradeoffs 538

Systems Assessment 539

    ISO/IEC 27001 539

    ISO/IEC 27002 541

Documented Compensating Controls 541

Training and Exercises 542

    Red Team 542

    Blue Team 542

    White Team 543

    Tabletop Exercise 543

Supply Chain Assessment 543

    Vendor Due Diligence 543

    Hardware Source Authenticity 544

Exam Preparation Tasks 544

Chapter 21 The Importance of Frameworks, Policies,Procedures, and Controls 549

Do I Know This Already? Quiz 549

Foundation Topics 552

Frameworks 552

    Risk-Based Frameworks 552

    Prescriptive Frameworks 555

Policies and Procedures 562

    Code of Conduct/Ethics 563

    Acceptable Use Policy (AUP) 563

    Password Policy 564

    Data Ownership 567

    Data Retention 567

    Account Management 568

    Continuous Monitoring 569

    Work Product Retention 570

Category 570

    Managerial 570

    Operational 571

    Technical 571

Control Type 571

    Preventative 572

    Detective 572

    Corrective 572

    Deterrent 572

    Directive 572

    Physical 572

Audits and Assessments 573

    Regulatory 573

    Compliance 575

Exam Preparation Tasks 575

Chapter 22 Final Preparation 579

Exam Information 579

Getting Ready 580

Tools for Final Preparation 582

    Pearson Test Prep Practice Test Software and Questions on the Website 582

    Memory Tables 582

    Chapter-Ending Review Tools 582

Suggested Plan for Final Review/Study 583

Summary 583

Appendix A Answers to the Do I Know This Already? Quizzes and Review Questions 585

Appendix B CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide Exam Updates 651

Glossary of Key Terms 653

Online Elements:

Appendix C Memory Tables

Appendix D Memory Tables Answer Key

Appendix E Study Planner

Glossary of Key Terms

9780136747161   TOC   9/1/2020

Updates

Submit Errata

More Information

Unlimited one-month access with your purchase
Free Safari Membership