1.2_ Surveying Cyberspace Flashcards

1
Q

What is the CIA TRIAD?

A

These three letters stand for confidentiality, integrity, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The quality of being able to be used or obtained belongs to what part of the triad?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some examples of availability attacks?

A

Hackers taking down a web-connected generator and disabling a critical power supply; using a denial of service attack to bring down a financial service provider’s website, making it impossible for clients to make transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Creating regular backups of data is what part of the triad?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The quality of being honest, whole, or undivided is what part of the triad.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s one example of integrity attacks?

A

Examples of integrity attacks include: intercepting money transfers and changing the dollar amount in “insignificant” ways in order to siphon off the excess; altering university grades to be better or worse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the state of being kept secret or private attributed to?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A hospital only allows authorized healthcare personnel within one department access to patient Personal Identifiable Information. When employees move to another department, that access is revoked is what part of the triad?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Only authorized personnel at a company have to write access to certain files. All other employees have only read access to these files is an example of what part of the triad?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A company employs redundant servers, which means that these systems are duplicated, and in the event of a malfunction, one server will fail over to other.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A hacker uses a man-in-the-middle attack to intercept wireless traffic from users. What part of the triad is this?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The process of identifying, containing and remediating threats on behalf of a company or organization is what cybersecurity domain?

A

Security operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List all 9 cybersecurity domains

A
  1. Security architecture
  2. Security operations
  3. Governance:
  4. Physical security
  5. Threat intelligence
  6. Career development:
  7. Risk assessment
  8. User education
  9. Frameworks and standards:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security design that addresses the requirements and potential risks involved in a given scenario or environment. It also specifies when and where to apply security controls is what domain?

A

Security architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The framework for managing performance and risk, oversight of compliance and control responsibilities, and defining the cyber mission by mapping the structure, authority, and processes to create an effective program is what domain?

A

Governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe the physical security domain

A

The protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage. This includes protection from fire, flood, natural disasters, burglary, theft, vandalism and terrorism.

17
Q

Research and analyzation of evidence-based knowledge regarding an existing or emerging menace describe what domain?

A

Threat intelligence

18
Q

Analyzes what can go wrong, how likely it is to happen, what the potential consequences are, and how tolerable the identified risk describes what domain?

A

Risk assessment

19
Q

The process of teaching users how to protect themselves from cyber attacks by informing them of risks, exploits, and external threats as well as teaching them the skills needed to combat common attacks describes what domain?

A

User Education

20
Q

Describe the frameworks and standards domain

A

The creation of new security frameworks and practices for professionals to adhere to.