8. Prepare for cybersecurity jobs Flashcards

1
Q

Business continuity plan BCP

A

document that outlines the procedures to sustain business operations during and after a significant disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidential data

A

data that often has limits on the number of people who have access to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Disaster recovery plan

A

plan that allows an organization’s security team to outline the steps needed to minimize the impact of a security incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Private data

A

info that should be kept from the public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Public data

A

data that is already accessible to the public and poses a minimal risk to the organization if viewed or shared by others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security mindset

A

ability to evaluate risk and constantly seek out and identify the potential or actual breach of a system, application, or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Sensitive data

A

type of data that includes personally identifiable info PII, sensitive personally identifiable info SPII, and protected health info PHI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data controller

A

person that determines the procedure and purpose for processing data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

data processor

A

person that is responsible for processing data on behalf of the data controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data protection officer DPO

A

individual that is responsible for monitoring the compliance of an organization’s data protection procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Escalation policy

A

set of actions that outlines who should be notified when an incident alert occurs and how that incident should be handled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Improper usage

A

incident type that occurs when an employee of an organization violates the organization’s acceptable use policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Incident esclation

A

process of identifying a potential security incident, triaging it, and handing it off to a more experienced team member

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Malware infection

A

incident type that occurs when malicious software designed to disrupt a system infiltrates an organization’s computers or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Unauthorized access

A

incident type that occurs when an individual gains digital or physical access to a system or an application without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Stakeholder

A

individual or group that has an interest in any decision or activity of an organization

17
Q

visual dashboard

A

way of displaying various types of data quickly in one place

18
Q

OWASP Top 10

A

globally recognized standard awareness document that lists the top 10 most critical security risk to web applications

19
Q

Rapport

A

friendly relationship in which the people involved understand each other’s ideas and communicate well with each other

20
Q

STAR method

A

interview technique used to answer behavioral and situational questions

21
Q

Elevator pitch

A

brief summary of your experience, skills, and background