Security Operations
Enhance security operations processes, differentiate threat intelligence and threat hunting, and identify malicious activity using appropriate tools.
In the context of the CompTIA Cybersecurity Analyst+ (CySA+) certification, Security Operations constitutes the tactical, day-to-day defense of an organization's digital assets. It centers on the functionalities typically performed within a Security Operations Center (SOC), where analysts monitor, …
Concepts covered: Email header analysis, Log ingestion and SIEM integration, Operating system (OS) concepts for security, Infrastructure security concepts, Network architecture and security, Identity and access management (IAM), Unexpected communication patterns, Network anomaly detection, Bandwidth spikes and unusual traffic, Rogue device detection, Host-based indicators of compromise, Unauthorized software detection, Data exfiltration indicators, Application irregularities, Encryption and cryptographic concepts, Sensitive data protection, Service interruption analysis, Social engineering attack indicators, Wireshark for network analysis, Security Information and Event Management (SIEM), VirusTotal and malware analysis tools, Pattern recognition techniques, Python scripting for security, PowerShell for security operations, Threat actors and adversary profiles, Tactics, techniques, and procedures (TTPs), Confidence levels in threat intelligence, Threat intelligence collection methods, Intelligence sharing and ISACs, Threat hunting techniques, Hypothesis-driven threat hunting, Standardizing security operations processes, Streamlining security operations, Tool integration and automation, Single pane of glass monitoring
CySA+ - Security Operations Example Questions
Test your knowledge of Security Operations
Question 1
During a security architecture review, a team is discussing how to improve their monitoring capabilities across cloud, on-premises, and endpoint environments. A junior analyst asks why organizations invest in single pane of glass solutions when individual tools already provide their own dashboards. Which response BEST explains the strategic advantage of this consolidated approach?
Question 2
A security analyst is reviewing a Wireshark capture and notices HTTP traffic containing encoded data in the User-Agent field that appears to follow a base64 pattern with regular beacon intervals of approximately 60 seconds. Which threat activity does this traffic characteristic most strongly suggest?
Question 3
A security analyst examining a Wireshark capture of suspected lateral movement activity observes multiple SMB connections from a single workstation to various internal servers. The analyst notices that each SMB session negotiation includes NTLM authentication with the same username but different challenge-response pairs. When applying the display filter 'ntlmssp.auth.username' to correlate these events, which additional Wireshark analysis technique would best help determine if credential harvesting tools like Mimikatz were used prior to this activity?