.01 RG Vocab introduction to cyber security Flashcards

1
Q

adaptive threat replication engineer

A

Replicates real threats to understand how they
operate and neutralizes them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Blue team

A

A security team responsible for maintaining overall system security, preventing
security breaches, monitoring potential threats, and researching security technology; typically
responsible for finding and implementing security controls to strengthen the CIA triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Certification

A

Proof of technical knowledge backed by an industry-standard provider such
as Microsoft or CompTIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cybersecurity

A

“The art of protecting networks, devices, and data from unauthorized access
or criminal use and the practice of ensuring confidentiality, integrity, and availability of
information” —Cybersecurity and Infrastructure Security Agency (2019)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cybersecurity engineer

A

Keeps computer information systems secure and controls access
to systems based on user classifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cyberseek

A

Website that provides details on cybersecurity-related positions in the US job
market

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Defensive cybersecurity analyst

A

: Researches and evaluates security threats and
products; recommends improvements to organizational cyber defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Digital forensic investigator

A

Gathers digital information evidence and trails in the systems
to determine how cybercrimes were committed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ethical hacker

A

Hired by organizations to legally hack into their networks and identify weak
entry points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Incident detection engineer

A

Replicates real threats to understand how they operate and
how to neutralize them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IT auditor

A

Assesses technology for potential security, efficiency, and compliance issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network security administrator

A

: Responsible for the management and monitoring of
organizational network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Red team

A

An organizational security team responsible for providing security assessments
outlining an organization’s system defense efficacy and resilience; uses penetration testing
tools to search for weaknesses and vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security operations center (SOC) analyst

A

Monitors and manages networks; works with
intrusion detection/prevention systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Vulnerability assessment analyst

A

Hunts for critical flaws and vulnerabilities in networks,
often as a third-party consultant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Interview coaching

A

Working with an instructor or a professional trainer to develop various
interview strategies and garner constructive feedback to improve overall interview skills

17
Q

Professional networking

A

Building and maintaining relationships with other professionals
that work directly within one’s field or in other related areas (Indeed Editorial Team, 2021)

18
Q

Business continuity

A

An organizational plan to deal with disasters and other difficult
situations such as cyberattacks, outages, or supply chain failures

19
Q

Financial impact

A

The overall fiduciary cost of an attack or breach to an organization

20
Q

Legal liability

A

Once a business becomes responsible for any individual’s data, it becomes
subject to privacy laws. The business could face fines or additional legal penalties if it
breaches those laws.

21
Q

Loss of productivity

A

When employees cannot perform their jobs because of a breach or
attack (ransomware being an excellent example)

22
Q

Organizational impact

A

A cybersecurity attack or breach’s impact on an organization’s
profits, productivity, image, etc.

23
Q

Personally identifiable information (PII)

A

Any information that could identify an
individual, including address, date of birth, social security number, etc

24
Q

Reputational loss

A

Losing the trust of business relationships, customers, and partners after
a breach or attack