CySA+: Security Operations and Monitoring Competency (Intermediate Level)

  • 30m
  • 30 questions
The CySA+: Security Operations and Monitoring Competency benchmark will measure your ability to recognize key terms and concepts related to security operations and monitoring. You will be evaluated on threat monitoring, data privacy, network scanning, risk mitigation, and intrusion detection. A learner who scores high on this benchmark demonstrates that they have the skills related to understanding key security operations and monitoring terminology and concepts.

Topics covered

  • capture and analyze IPsec network traffic
  • compare baseline and current scans to identify changes
  • configure cloud data classification using Amazon Web Services Macie
  • configure DLP policies with Microsoft Azure
  • delete a disk partition using a multiple pass disk wiping tool
  • describe common items to look out for when analyzing network traffic
  • determine when DLP solutions should be used for data privacy
  • discuss various types of IT security training exercises
  • enable IPsec connection security rules using Microsoft Group Policy
  • enable Microsoft Group Policy password lockout settings
  • enter a WPA password in WireShark to decrypt wireless traffic
  • filter captured network traffic
  • list common items to look out for when monitoring an e-mail ecosystem
  • monitor, block, and configure notifications for devices on a Wi-Fi network using the eero app
  • playback a captured VoIP call
  • recall how automation can simplify and expedite security tasks
  • recognize how IPsec can be used to secure any type of IP traffic
  • recognize how SIEM provides centralized security event monitoring and management
  • recognize how to filter out noise to identify suspicious activity
  • recognize where honeypots can be used to monitor malicious activity
  • run a Nessus vulnerability scan
  • upload a PCAP file for analysis
  • use aircrack-ng in Kali Linux to crack protected Wi-Fi networks
  • use hashing to detect file changes through steganography
  • use Kismet to detect Wi-Fi networks
  • use Nessus to audit Amazon Web Services (AWS)
  • use Nessus to scan LAN hosts for malware
  • use the hping tool to generate network SYN flood traffic
  • use third-party tool to encrypt sensitive files
  • view vulnerability scan results