Module 10 - Cybersecurity principles, practices and processes Flashcards

(67 cards)

1
Q

Which model breaks down data protection into three dimensions to guide cybersecurity practices?

A

The Cybersecurity cube

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which principle ensures that data is only accessible to authorized entities?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three security principles at the core of the cybersecurity cube?

A

Confidentiality, Integrity and Availability (CIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which principle guarantees the accuracy, consistency, and trustworthiness of data?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three data states represented in the second dimension of the cybersecurity cube?

A

Data in transit, Data at rest, Data in process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which principle focuses on ensuring data is accessible when needed by authorized users?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three safeguard categories in the cybersecurity cube’s third dimension?

A

People, Policies and Practices, Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What safeguard dimension involves setting up rules and controls to guide secure behavior?

A

Policies and practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What safeguard dimension focuses on increasing human awareness and skills in cybersecurity?

A

People

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which substitution technique enhances confidentiality by replacing sensitive data with meaningless tokens?

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does tokenization differ from encryption?

A

Tokens have no relationship to the original data and are useless outside of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which technology manages and restricts access to copyrighted digital content like music and e-books?

A

DRM (Digital Rights Management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which technology helps control access to organizational documents such as emails and files?

A

IRM (Information Rights Management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of information includes data that can identify an individual, like medical or credit records?

A

Personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of data includes sensitive internal details like trade secrets or customer lists?

A

Business information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which category of data includes government information labeled as secret, confidential, or restricted?

A

Classified information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which privacy technique turns identifiable information into anonymous, irreversible data?

A

Data anonymization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which principle refers to the accuracy, consistency, and trustworthiness of data throughout its lifecycle?

A

Data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the level of data integrity need for a healthcare organization ?

A

Critical level-{inaccurate prescription data can be life-threatening}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is data integrity prioritized in e-commerce or analytics-based businesses?

A

High level -{data is validated and verified frequently to ensure accuracy}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What level of data integrity need applies to public data from search engines and online sales?

A

Mid level -{limited verification and reduced trust}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which types of platforms have a low level of integrity need due to unverified user content?

A

Blogs and personal social media pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which principle ensures that information and systems remain accessible to authorized users when needed?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
What must be tested to ensure data recovery is possible in case of loss?
Backup systems and backed up data
6
Which plan ensures that employees and cybersecurity teams are prepared to respond and recover from major disruptions?
A disaster plan
6
Which data state applies when information is stored and not being accessed or modified by any process or user?
Data at rest
6
What type of storage is directly attached to a single computer, such as an internal hard drive or USB flash drive?
DAS (Directly Attached Storage)
7
Which storage solution uses multiple disks presented as one to improve performance and fault tolerance?
RAID (Redundant Array of Independent Disks)
7
What is the key benefit of RAID arrays for enterprise storage?
Improved performance and fault tolerance
7
Which network-based storage device allows multiple authorized users to store and retrieve data centrally?
NAS (Network Attached Storage)
7
Which high-speed, network-based storage architecture connects multiple servers to centralized disk repositories?
SAN (Storage Area Network)
8
What characteristic differentiates SAN from other network storage?
SAN has high speed network interfaces
8
Which remote storage option uses a data center provider’s infrastructure and is accessed over the Internet?
Cloud Storage
8
Which storage type is not shared by default and requires manual configuration to be network-accessible?
DAS (Direct Attached Storage)
9
Which type of storage is difficult to manage and especially vulnerable to malicious attacks on the local host?
DAS (Direct Attached Storage)
9
Which data state involves sending information from one device to another, rather than storing or actively using it?
Data in transit
10
What term refers to data moved physically between computers using removable media like USB drives?
Sneaker net
10
What security method ensures both the user and the server verify each other's identity?
Mutual Authentication
10
Which data state refers to the stage when data is being input, computed, modified, or output?
Data in Process
11
Which data state occurs during initial entry from forms, sensors, file uploads, or manual typing?
Input stage of Data in process
12
Which data process involves changing data through manual edits or automated processing like encryption or compression?
Data modification
12
What term describes unintentional or malicious changes that make data unreadable or unusable?
Data corruption
12
Which process describes data being sent to output devices such as printers or displays?
Data output
12
Which software tool controls remote access to a system and is often built into operating systems?
A software firewall
12
Which tools are used to discover and monitor open ports on hosts or servers?
Network and port scanners
13
Which devices collect and examine network traffic to detect misconfigurations, app issues, and communication problems?
Protocol/Signature analyzers
13
Which scanning tools assess weaknesses in computers or networks?
Vulnerability scanners
13
Which hardware or software system blocks unwanted network traffic using customizable traffic rules?
A firewall
14
Which device presents a single organization-wide IP address to the Internet and can mask user identities?
A proxy server
15
What does hardware-based access control use to verify identity before granting access to data or systems?
Biometric technology
15
What term refers to physical devices that enforce identity verification using biometrics?
Hardware based access control
15
What networking device serves as a connection point and helps increase network security and efficiency?
A Network switch
15
Which analyzer is used to establish normal traffic baselines and detect performance or application issues?
A protocol analyzer
16
Which security tool allows you to identify open ports that may be vulnerable on a host system?
A Port scanner
16
What two elements are essential for ensuring employees support security goals effectively?
A strong security awareness program and security policies.
17
Which document demonstrates a company’s commitment to cybersecurity while setting behavioral rules?
A Security Policy
17
Which security policy component specifies who is authorized to access network resources and how they’re verified?
Identification and authentication policies
17
Which policy ensures strong passwords and routine password changes?
A Password policy
17
Which policy outlines rules for secure network access by off-site users?
Remote access policy
17
Which policy specifies how system and application updates are performed?
Network maintenance policy
18
Which security policy details the procedures for handling breaches and other incidents?
Incident Handling policies
18
What defines what system and network behavior is acceptable, and what is prohibited Bans on specific websites, newsgroups, or bandwidth-intensive applications?
AUP (Acceptable Use Policy)
18
Which document type offers flexible suggestions for improving security without being mandatory?
Guidelines
19
What is a key difference between guidelines and standards?
Guidelines are not mandatory while standards are enforced
19
Which type of security document includes step-by-step instructions and visuals for implementation?
Procedures
19
What is available from organizations such as the NIST (National Institute of Standards and Technology), and the NSA (National Security Agency) Security Configurations Guide , and the Common Criteria Standard??
They provide external cybersecurity guidelines