mod 1 Flashcards

1
Q

Replicates real threats to understand how they operate and neutralizes them

A

Adaptive threat replication engineer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A security team responsible for maintaining overall system security, preventing security breaches, monitoring potential threats, and researching security technology; typically responsible for finding and implementing security controls to strengthen the CIA triad

A

Blue team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Proof of technical knowledge backed by an industry-standard provider such as Microsoft or CompTIA

A

Certification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Keeps computer information systems secure and controls access to systems based on user classifications

A

Cybersecurity engineer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Website that provides details on cybersecurity-related positions in the US job market

A

Cyberseek

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Researches and evaluates security threats and products; recommends improvements to organizational cyber defense

A

Defensive cybersecurity analyst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Gathers digital information evidence and trails in the systems to determine how cybercrimes were committed

A

Digital forensic investigator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hired by organizations to legally hack into their networks and identify weak entry points

A

Ethical hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Replicates real threats to understand how they operate and how to neutralize them

A

Incident detection engineer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Assesses technology for potential security, efficiency, and compliance issues

A

IT auditor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Responsible for the management and monitoring of organizational network security

A

Network security administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An organizational security team responsible for providing security assessments outlining an organization’s system defense efficacy and resilience; uses penetration testing tools to search for weaknesses and vulnerabilities

A

Red team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Monitors and manages networks; works with intrusion detection/prevention systems

A

Security operations center (SOC) analyst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hunts for critical flaws and vulnerabilities in networks, often as a third-party consultant

A

Vulnerability assessment analyst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An organizational plan to deal with disasters and other difficult situations such as cyberattacks, outages, or supply chain failures

A

Business continuity

17
Q

The overall fiduciary cost of an attack or breach to an organization

A

Financial impact

18
Q

Once a business becomes responsible for any individual’s data, it becomes subject to privacy laws. The business could face fines or additional legal penalties if it breaches those laws.

A

Legal liability

19
Q

When employees cannot perform their jobs because of a breach or attack (ransomware being an excellent example)

A

Loss of productivity

20
Q

A cybersecurity attack or breach’s impact on an organization’s profits, productivity, image, etc.

A

Organizational impact

21
Q

Any information that could identify an individual, including address, date of birth, social security number, etc.

A

Personally identifiable information (PII):

22
Q

Losing the trust of business relationships, customers, and partners after a breach or attack

A

Reputational loss