Study Questions Flashcards

1
Q

What is the purpose of security frameworks?

A
  1. Protecting PII.
  2. Securing financial information.
  3. identify security weaknesses
  4. Managing organizational risks.
  5. Aligning security with business goals.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four core components of frameworks?

A
  1. Identifying and documenting security goals.
  2. Setting guidelines to chief security goals.
  3. Implementing strong security process.
  4. Monitoring and communicating results.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three core principles and ethical security?

A
  1. Confidentiality: only authorized users can ask a specific assets or data.
  2. Privacy protections: safeguarding personal information from an authorized users.
  3. Laws: rules that are recognized by a community and enforced by a governing entity.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the seven reasons why social engineering attacks are affective?

A
  1. Authority: throat actors impersonate individuals with power. This is because people in general have been conditioned to respect and follow authority figures.
  2. Intimidation: threat actors Use bullying tactics. This includes persuading and intimidating victims into doing what they’re told.
  3. Consensus/social proof: because people sometimes do things that they believe many others are doing thread actors. Use others trust to pretend they are legitimate.
  4. Scarcity: a tactic used to imply that goods or services are Unlimited supply
  5. familiarity: threat actors, establish a fake emotional connection with users that can be exploited
  6. Trust: threat actors, establish an emotional relationship with users that can be exploited overtime. They use this relationship developed trust in game personal information
  7. Urgency: a threat actor persuade others to respond quickly and without requesting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the eight CISSP security domains?

A
  1. Security and risk management: define security goals and objectives, risk mitigation, compliance, business continuity and the law
  2. Asset security: secures digital and physical assets. It is also regulated to the storage, maintenance, retention. and destruction of data.
  3. Security, architecture and engineering: optimize data security by ensuring effective tools, systems, and processes are in place.
  4. Communication in network security: manage and secure physical networks and wireless communications.
  5. Identity and access management: keeps data secure, by ensuring users follow establish policies to control and manage physical assets like office spaces, and logical assets, such as networks and applications
  6. Security assessment and testing: conducting security control testing, collecting and analyzing data, and conducting security audits to monitor for risks, threats, and vulnerabilities.
  7. Security operations: conducting investigations and implementing preventative measures.
  8. Software development security: uses secure coding practices, which are a set of recommended guidelines that are used to create secure applications and services.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the benefits of Cybersecurity?

A
  1. Protects against internal and external threats
  2. Meet regulatory compliance.
  3. Maintains and improves business productivity.
  4. Reduces expenses.
  5. Maintaining brand trust.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the primary responsibilities of an analyst?

A
  1. Protecting computer and network systems.
  2. Installing prevention software.
  3. Conducting periodic security audit.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the different types of Phishing?

A
  • Business Email Compromise (BEC): A threat actor sends an email message that seems to be from a known source to make a seemingly legitimate request for information, in order to obtain a financial advantage.
  • Spear phishing: A malicious email attack that targets a specific user or group of users. The email seems to originate from a trusted source.
  • Whaling: A form of spear phishing. Threat actors target company executives to gain access to sensitive data.
  • Vishing: The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source.
  • Smishing: The use of text messages to trick users, in order to obtain sensitive information or to impersonate a known source.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are different types of malware?

A
  • Virus: a piece of malicious code that spreads from onecomputer to another by attaching itself to other files using self replication.
  • Worms: a self-replicating Malware that does not require human interaction.Their main is goal is to just spread and cripple resources orturn computers into zombies.
  • Trojan Horses (aka trojans): hiden Malware that causesdamage to a system or gives an attack access to the host.
  • Spyware: the main goal of spyware is to track and report the usage of the host orto collect data that the attacker desires to obtain.
  • Adware: code that automatically displays ordownloads unsolicited advertisements, usually seen on a browser pop up.
  • RATs (Remote Access Tool OR Remote Access Trojans): RATs allow the attacker to gain unauthorized access andcontrol the computer.
  • Rootkit: a piece of software that is intended to take full orpartial control of a system at the lowest level.
  • Ransomeware: a malware that infects the host with a code thatrestricts the access to the computer or the data on it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the different social engineering attacks?

A
  • Social media phishing: A threat actor collects detailed information about their target from social media sites. Then, they initiate an attack.
  • Watering hole attack: A threat actor attacks a website frequently visited by a specific group of users.
  • USB baiting: A threat actor strategically leaves a malware USB stick for an employee to find and install, to unknowingly infect a network.
  • Physical social engineering: A threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the CIA triad and what do each of the Letter in CIA stand for and their meaning

A

A foundational model that helps inform how organizations consider risk when setting up systems and security policies

  • C: Confidentiality: Only authorized users can access specific assets or data
  • I: Integrity: Data is correct, authentic, and reliable
  • A: Availability: Data is accessible to those who are authorized to access it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly