Course 1 Flashcards

(38 cards)

1
Q

What is Cybersecurity?

A

The practice of ensuring confidentiality, integrity, and availability (CIA) of information by protecting networks, devices, and data from unauthorized access or exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the benefits of Cybersecurity.

A
  • Protects against internal/external threats
  • Meets regulatory compliance
  • Maintains or improves business productivity
  • Reduces expenses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are common job roles in Cybersecurity?

A
  • Security Analyst/Specialist
  • Cybersecurity Analyst/Specialist
  • Security Operations Center (SOC) Analyst
  • Information Security Analyst
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the responsibilities of a Security Analyst?

A
  • Protecting systems/networks
  • Installing prevention software
  • Conducting security audits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Threat Actor.

A

A person/group posing a cybersecurity threat by attempting to breach systems, steal data, or cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an Internal Threat?

A

A security risk originating from inside an organization, often by employees or partners—either unintentionally or deliberately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Network Security?

A

The process of protecting a computer network from intrusions, misuse, or unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Cloud Security?

A

Securing data, applications, and services hosted in the cloud. Ensures only authorized users access the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Security Frameworks?

A

Structured guidelines organizations use to create policies and practices that reduce cyber risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Security Controls?

A

Specific protective actions (like firewalls or multi-factor authentication) used to counter threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Security Posture.

A

A measure of an organization’s overall cybersecurity strength and preparedness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does Compliance entail in Cybersecurity?

A

Meeting external regulations (like GDPR, HIPAA) and internal policies to ensure legal and secure operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the components of the CIA Triad?

A
  • Confidentiality
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List transferable skills necessary for Cybersecurity Analysts.

A
  • Communication
  • Collaboration
  • Problem-solving
  • Time management
  • Growth mindset
  • Respect for diversity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some technical skills for Cybersecurity Analysts?

A
  • Programming languages
  • SIEM tools
  • Computer forensics
  • IDS (Intrusion Detection Systems)
  • Threat landscape knowledge
  • Incident response
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Malware.

A

Malicious software that harms systems or steals data.

17
Q

What are the types of Malware?

A
  • Viruses
  • Worms
  • Ransomware
  • Spyware
18
Q

What is Phishing?

A

Deceptive messages tricking users into revealing personal information.

19
Q

What are the types of Phishing?

A
  • BEC
  • Spear Phishing
  • Whaling
  • Vishing
  • Smishing
20
Q

What is Social Engineering?

A

Manipulating people to reveal confidential information.

21
Q

List key principles of Social Engineering.

A
  • Authority
  • Intimidation
  • Consensus
  • Scarcity
  • Familiarity/Trust
  • Urgency
22
Q

What is the NIST Cybersecurity Framework (CSF)?

A

A widely used standard for managing and reducing cybersecurity risk.

23
Q

What does NIST RMF stand for?

A

NIST Risk Management Framework.

24
Q

What are CIS Controls?

A

A set of prioritized actions that improve security.

25
What is FedRAMP?
Ensures standardized security assessments for cloud services used by federal agencies.
26
List some compliance regulations.
* HIPAA * PCI DSS * GDPR * SOC 1 & SOC 2
27
What are the components of the Security Lifecycle?
* Identify and document security goals * Set guidelines to achieve goals * Implement controls and processes * Monitor, review, and report
28
What are SIEM Tools used for?
Analyze large volumes of logs, issue alerts, and help detect threats.
29
What is a Network Protocol Analyzer?
A tool that monitors and diagnoses network traffic.
30
What are Playbooks in Cybersecurity?
Standardized procedures for handling incidents.
31
What is the purpose of Antivirus software?
Scans for and removes malicious software.
32
What is Encryption?
Converts data into unreadable formats to prevent unauthorized access.
33
What is Penetration Testing?
Simulated attacks to identify security weaknesses.
34
What are the 8 Domains of CISSP?
* Security and Risk Management * Asset Security * Security Architecture and Engineering * Communication and Network Security * Identity and Access Management (IAM) * Security Assessment and Testing * Security Operations * Software Development Security
35
What is Security Ethics?
Principles guiding responsible behavior in handling private data and systems.
36
List Ethical Principles in Cybersecurity.
* Confidentiality * Privacy Protections * Legal Adherence
37
True or False: Counterattacking is legal for private citizens.
False
38
What is the best practice regarding counterattacks?
Focus on defense, not revenge.