Lesson 1 - Security Roles and Controls Flashcards
What is the CIA triad?
Confidentiality, Integrity, and Availability
What is the NIST Cybersecurity Framework?
Identify, Protect, Detect, Respond, Recover
What is the purpose of the Security Operations Center (SOC)?
This is where security professionals monitor and protect critical information assets across other business functions.
Which security related phrase relates to the integrity of data?
Modification - Any modification is authorized and is stored and transferred as intended when referring to the integrity of data.
How might the goals of basic network management not align with the goals of security?
Management focuses on availability over confidentiality.
Any external responsibility for an organization’s security lies mainly with which individuals?
The senior executives.
The NIST provides a framework that classifies security-related functions. Which description aligns with the “respond” function?
Identify, analyze, and eradicate threats
The ________ requires federal agencies to develop security policies for computer systems that process confidential information.
Computer Security Act
After a poorly handled security breach, a company updates its security policy to include an improved incident response plan. Which of the following security controls does this update address?
Corrective
Which of the following has a cyber security framework (CSF) that focuses exclusively on IT security rather than IT service provisioning?
National Institute of Standards and Technology (NIST)