1 Today's Security Professional Flashcards

1
Q

What are the three core objectives of cybersecurity?

A

Confidentiality, integrity, availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does confidentiality ensure in cybersecurity?

A

Unauthorized individuals cannot gain access to sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of integrity in cybersecurity?

A

Ensures no unauthorized modifications to information or systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does availability ensure in cybersecurity?

A

Information and systems are ready for legitimate users when requested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is nonrepudiation?

A

Prevents someone from denying that they took an action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give an example of nonrepudiation.

A

Digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How are security controls categorized?

A

Managerial, operational, physical, technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the types of security controls based on their intended purpose? (PDCDCD)

A

Preventive, detective, corrective, deterrent, compensating, directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the impacts of data breaches on organizations?

A

Direct and indirect damages, financial repercussions, reputational damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What can result from operational damage in a data breach?

A

Availability damages preventing access to information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How must data be protected? (Data states)

A

In transit, at rest, in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is data vulnerable in transit?

A

Attackers may eavesdrop on network transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What technology is used to protect data in transit?

A

Encryption technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do data loss prevention (DLP) systems do?

A

Block data exfiltration attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do DLP systems function at the host level?

A

Using software agents to search systems for sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of data minimization?

A

Reduces risk by reducing the amount of sensitive information maintained

17
Q

What techniques can be used for data protection when discarding is not possible?

A

Deidentification, data obfuscation

18
Q

Name tools used for deidentification and data obfuscation. (HTM)

A

Hashing, tokenization, masking