Put It to Work: Prepare for Cybersecurity Jobs Flashcards

1
Q

Confidential data

A

Data that often has limits on the number of people who have access to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Disaster Recovery Plan

A

A plan that allows an organization’s security team to outline the steps needed to minimize the impact of a security incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Private data

A

Information that should be kept from the public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Public data

A

Data that is already accessible to the public and poses a minimal risk to the organization if viewed or shared by others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security mindset

A

The ability to evaluate risk and constantly seek out and identify the potential or actual breach of a system, application, or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Sensitive data

A

A type of data that includes personally identifiable information (PII), sensitive personally identifiable information (SPII), and protected health information (PHI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data controller

A

A person that determines the procedure and purpose for processing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data processor

A

A person that is responsible for processing data on behalf of the data controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data protection officer (DPO)

A

An individual that is responsible for monitoring the compliance of an organization’s data protection procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Escalation policy

A

A set of actions that outlines who should be notified when an incident alert occurs and how that incident should be handled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Improper usage

A

An incident type that occurs when an employee of an organization violates the organization’s acceptable use policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Incident escalation

A

The process of identifying a potential security incident, triaging it, and handing it off to a more experienced team member.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware infection

A

An incident type that occurs when malicious software designed to disrupt a system infiltrates an organization’s computers or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Unauthorized access

A

An incident type that occurs when an individual gains digital or physical access to a system or an application without permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data protection officer

A

What does DPO stand for?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data owner

A

The person that decides who can access, edit, use, or destroy their information.

17
Q

Data custodian

A

The person that assigns and removes access to software or hardware.

18
Q

Stakeholder

A

An individual or a group that has an interest in any decision or activity of an organization.

19
Q

Visual dashboard

A

A way of displaying various types of data quickly in one place

21
Q

Rapport

A

A friendly relationship in which the people involved understand each other’s ideas and communicate well with each other.

22
Q

STAR method

A

An interview technique used to answer behavioral and situational questions.

23
Q

Elevator pitch

A

A brief summary of your experience, skills, and background.

24
Q

Situation

A

The project you worked on or a challenge that you had to overcome.

25
Task
Outlines the key responsibilities or role you played in solving the challenge described in the situation phase of the STAR method.
26
Action
Describes the exact steps you took to resolve the challenging situation you described in the beginning of the STAR method.
27
Result
How the situation was resolved as a direct result of the actions you took in solving the challenge described in the situation phase of the STAR method.
28
What does STAR stand for?