(1) Foundations of Cybersecurity Flashcards
Fill in the blank: Cybersecurity is the practice of ensuring _____ by protecting networks, devices, people, and data from unauthorized access or criminal exploitation.
compliance, instructions, and accuracy
continuity, infrastructure, and attainment of business goals
customer trust, increased revenue, and advancement
confidentiality, integrity, and availability of information
confidentiality, integrity, and availability of information
Cybersecurity is the practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation.
What are the primary responsibilities of an entry-level security analyst? Select three answers.
Monitor systems
Protect information
Create compliance laws
Search for weaknesses
Monitor systems
Protect information
Search for weaknesses
The primary responsibilities of an entry-level security analyst are as follows: Monitor systems, protect information, and search for weaknesses.
Fill in the blank: Performing _____ enables security professionals to review an organization’s security records, activities, and related documents.
software developments
penetration tests
security audits
ethical hacking
security audits
Performing security audits enables security professionals to review an organization’s security records, activities, and related documents.
In what ways do security teams bring value to an organization? Select two answers.
Reducing business productivity
Protecting against external and internal threats
Increasing operational expenses
Achieving regulatory compliance
Protecting against external and internal threats
Achieving regulatory compliance
Achieving regulatory compliance and protecting against external and internal threats are ways that security teams bring value to an organization.
Which of the following proficiencies are transferable skills, likely to be applicable in almost any field? Select three answers.
Problem-solving
Written and verbal communication
Analysis
Programming
Problem-solving
Written and verbal communication
Analysis
Analysis, problem-solving, and written and verbal communication skills are transferable entry-level security analyst skills.
Which of the following proficiencies are technical skills that are needed to become an entry-level security analyst? Select two answers.
Regulation writing
Data analysis
Programming
Collaboration
Programming and data analysis are technical skills, which are needed to become an entry-level security analyst.
Fill in the blank: _____ identify, analyze, and preserve criminal evidence within networks, computers, and electronic devices.
Digital forensic investigators
Business intelligence professionals
Ethical hackers
Security operations center analysts
Digital forensic investigators
Digital forensic investigators identify, analyze, and preserve criminal evidence within networks, computers, and electronic devices.
What are examples of sensitive personally identifiable information (SPII) that cybersecurity professionals need to protect? Select two answers.
Email addresses
Last names
Bank account numbers
Medical records
Bank account numbers
Medical records
Medical records and bank account numbers are examples of sensitive personally identifiable information. SPII is a specific type of PII that requires stricter protections because it can be significantly more damaging to individuals if it is stolen.
Fill in the blank: Cybersecurity aims to protect networks, devices, people, and data from _____ or unauthorized access.
changing business priorities
poor financial management
market shifts
criminal exploitation
criminal exploitation
A security professional collaborates with information technology teams to deploy an application that helps identify risks and vulnerabilities. What does this scenario describe?
Installing detection software
Ethical hacking
Conducting a security audit
Upgrading network capacity
Installing detection software
Someone outside of an organization attempts to gain access to its private information. What type of threat does this scenario describe?
Internal
Ethical
Accidental
External
External
Fill in the blank: Identity theft is the act of stealing _____ to commit fraud while impersonating a victim.
business records
trade secrets
personal information
hardware
personal information
What is regulatory compliance?
Expenses and fines associated with vulnerabilities
Sites and services that require complex passwords to access
Laws and guidelines that require implementation of security standards
Threats and risks from employees and external vendors
Laws and guidelines that require implementation of security standards
Which of the following proficiencies are examples of technical skills? Select two answers.
Automating tasks with programming
Applying computer forensics
Communicating with employees
Prioritizing collaboration
Automating tasks with programming
Applying computer forensics
Fill in the blank: Security information and _____ management (SIEM) tools enable security professionals to identify and analyze threats, risks, and vulnerabilities.
event
emergency
employer
enterprise
event
What do security professionals typically do with SIEM tools?
Identify and analyze security threats, risks, and vulnerabilities
Locate and preserve criminal evidence
Educate others about potential security threats, risks, and vulnerabilities
Identify threat actors and their locations
Identify and analyze security threats, risks, and vulnerabilities
Which of the following statements accurately describe personally identifiable information (PII) and sensitive personally identifiable information (SPII)? Select all that apply.
The theft of PII is often more damaging than the theft of SPII.
Both PII and SPII are vulnerable to identity theft.
An example of PII is someone’s date of birth.
An example of SPII is someone’s financial information.
Both PII and SPII are vulnerable to identity theft.
An example of PII is someone’s date of birth.
An example of SPII is someone’s financial information.
What is one way that the Morris worm helped shape the security industry?
It prevented the development of illegal copies of software.
It inspired threat actors to develop new types of social engineering attacks.
It led to the development of computer response teams.
It made organizations more aware of the significant financial impact of security incidents.
It led to the development of computer response teams.
The Morris worm helped shape the security industry because it led to the development of computer emergency response teams, now commonly referred to as computer security incident response teams (CSIRTs).
What were the key impacts of the Equifax breach? Select two answers.
Developers were able to track illegal copies of software and prevent pirated licenses.
Millions of customers’ PII was stolen.
The significant financial consequences of a breach became more apparent.
Phishing became illegal due to significant public outcry.
Millions of customers’ PII was stolen.
The significant financial consequences of a breach became more apparent.
The key impacts of the Equifax breach were the fact that millions of customers’ PII was stolen and that the significant financial consequences of a breach became more apparent.
Social engineering, such as phishing, is a manipulation technique that relies on computer error to gain private information, access, or valuables.
True
False
False
Social engineering, such as phishing, is a manipulation technique that relies on human error (not computer error) to gain private information, access, or valuables.
Fill in the blank: Examples of security _____ include security and risk management and security architecture and engineering.
domains
data
assets
networks
domains
Examples of security domains include security and risk management and security architecture and engineering.
A security professional is asked to destroy and dispose of old hard drives that include confidential customer information. Which security domain is this task related to?
Software development security
Communication and network security
Security and risk management
Asset security
Asset security
This task is related to the asset security domain. This domain focuses on managing and securing digital and physical assets, as well as the storage, maintenance, retention, and destruction of data.
Your supervisor asks you to audit user permissions for payroll data to ensure no unauthorized employees have access to it. Which security domain is this audit related to?
Asset security
Security assessment and testing
Security operations
Software development security
Security assessment and testing
This is related to security assessment and testing, which often involves regular audits of user permissions to make sure employees and teams have the correct level of access.
You are asked to investigate an alert related to an unknown device that is connected to the company’s internal network. After you complete your investigation, you follow company policies and procedures to implement preventative measures that will stop the potential threat posed by the device. Which security domain is this scenario related to?
Asset security
Security architecture and engineering
Software development security
Security operations
Security operations
This is related to the security operations domain, which is focused on conducting investigations and implementing preventative measures. In this scenario, following company policies and procedures to stop the potential threat is an example of taking preventative measures.
Fill in the blank: A _____ is malicious code written to interfere with computer operations and cause damage to data.
computer virus
spyware attack
software breach
business disruption
computer virus
Which security event, related to the successful infiltration of a credit reporting agency, resulted in one of the largest known data breaches of sensitive information, including customers’ social security and credit card numbers?
LoveLetter attack
Brain virus
Equifax breach
Morris worm
Equifax breach
Fill in the blank: Exploiting human error to gain access to private information is an example of _____ engineering.
communication
digital
social
network
social