Foundations of Cybersecurity Flashcards

(13 cards)

1
Q

Compliance

A

is the process of adhering to internal standards and external regulations and enables organizations to avoid fines and security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security controls

A

are safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Frameworks

A

are guidelines used for building plans to help mitigate risks and threats to data and privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question 1
Fill in the blank: Cybersecurity aims to protect networks, devices, people, and data from _____ or criminal exploitation.

poor financial management

unauthorized access

changing business priorities

market shifts

A

unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some key benefits associated with an organization meeting regulatory compliance? Select two answers.

Identifying trends

Avoiding fines

Recruiting employees

Upholding ethical obligations

A

Avoiding fines
Upholding ethical obligations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do security professionals typically do with SIEM tools?

Locate and preserve criminal evidence

Identify and analyze security threats, risks, and vulnerabilities

Identify threat actors and their locations

Educate others about potential security threats, risks, and vulnerabilities

A

Identify and analyze security threats, risks, and vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following statements accurately describe personally identifiable information (PII) and sensitive personally identifiable information (SPII)? Select all that apply.

An example of SPII is someone’s financial information.

Both PII and SPII are vulnerable to identity theft.

The theft of PII is often more damaging than the theft of SPII.

An example of PII is someone’s date of birth.

Correct

A

Both PII and SPII are vulnerable to identity theft.
An example of PII is someone’s date of birth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Watering hole attack

A

A threat actor attacks a website frequently visited by a specific group of users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is one way that the Morris worm helped shape the security industry?

It inspired threat actors to develop new types of social engineering attacks.

It made organizations more aware of the significant financial impact of security incidents.

It led to the development of computer response teams.

It prevented the development of illegal copies of software.

A

It led to the development of computer response teams.

The Morris worm helped shape the security industry because it led to the development of computer emergency response teams, now commonly referred to as computer security incident response teams (CSIRTs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fill in the blank: Examples of security _____ include security and risk management and security architecture and engineering.

data

assets

networks

domains

A

Domain

Examples of security domains include security and risk management and security architecture and engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A security professional is asked to destroy and dispose of old hard drives that include confidential customer information. Which security domain is this task related to?Question 2
A security professional is asked to destroy and dispose of old hard drives that include confidential customer information. Which security domain is this task related to?

Security and risk management

Communication and network security

Asset security

Software development security

A

Assets Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Your supervisor asks you to audit user permissions for payroll data to ensure no unauthorized employees have access to it. Which security domain is this audit related to?

Security assessment and testing

Software development security

Security operations

Asset security

A

Security assessment and testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly