OBJ 1 Needs to Know Flashcards

(33 cards)

1
Q

What does the acronym CIA stand for in information security?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: Confidentiality ensures that information is accessible only to authorized users.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary goal of integrity in information security?

A

To ensure that data is accurate and unaltered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fill in the blank: Availability ensures that information and resources are ______ when needed.

A

accessible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is a common method to ensure data confidentiality? A) Encryption B) Backup C) Firewall

A

A) Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of access controls in information security?

A

To restrict access to data and resources based on user roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False: Multi-factor authentication increases security by requiring multiple forms of verification.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a security policy?

A

A formal set of rules that govern how an organization manages its security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of attack involves overwhelming a system with traffic? A) Phishing B) Denial of Service C) Man-in-the-Middle

A

B) Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the primary function of a firewall?

A

To monitor and control incoming and outgoing network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the principle of least privilege entail?

A

Users should have the minimum level of access necessary to perform their tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fill in the blank: A ______ is a malicious software designed to harm or exploit any programmable device.

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False: Social engineering is a technique used to manipulate individuals into divulging confidential information.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between a threat and a vulnerability?

A

A threat is a potential danger, while a vulnerability is a weakness that can be exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is an example of a physical security control? A) Encryption B) Security Guards C) Firewalls

A

B) Security Guards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of incident response?

A

To manage and mitigate the impact of security breaches or attacks.

17
Q

Fill in the blank: A ______ is a documented set of procedures for addressing security incidents.

A

incident response plan

18
Q

True or False: Regular software updates can help mitigate security vulnerabilities.

19
Q

What is the role of an intrusion detection system (IDS)?

A

To monitor network traffic for suspicious activity and potential threats.

20
Q

What does the term ‘phishing’ refer to?

A

A fraudulent attempt to obtain sensitive information by impersonating a trustworthy entity.

21
Q

Which of the following is a strong password policy? A) Short and simple passwords B) Long passwords with special characters C) Using the same password for all accounts

A

B) Long passwords with special characters

22
Q

What is the purpose of a security audit?

A

To evaluate and improve an organization’s security measures.

23
Q

Fill in the blank: ______ is the process of converting plaintext into ciphertext to protect information.

24
Q

Which security framework provides guidelines for managing cybersecurity risks?

A

NIST Cybersecurity Framework

25
True or False: A VPN is used to create a secure connection over a less secure network.
True
26
What does the term 'malware' encompass?
All types of malicious software, including viruses, worms, and spyware.
27
What is the primary purpose of data loss prevention (DLP) technologies?
To prevent sensitive data from being accessed or transmitted by unauthorized users.
28
Fill in the blank: A ______ is a type of attack that involves intercepting and altering communication between two parties.
Man-in-the-Middle attack
29
What is the importance of security awareness training?
To educate employees about security risks and best practices to mitigate them.
30
True or False: Strong authentication methods can include biometrics.
True
31
Which of the following is an example of an administrative control? A) Employee training B) Firewalls C) Antivirus software
A) Employee training
32
What is the function of a digital certificate?
To verify the identity of an entity in electronic transactions.
33
Fill in the blank: The process of identifying and classifying data based on its sensitivity is known as ______.
data classification