Chapter 1 - Today's Security Professional Flashcards

1
Q

Ensures that unauthorized individuals are not able to gain access to sensitive information.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ensures that there are no unauthorized modifications to information or systems, either intentionally or unintentionally.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Someone who performed some action, such as sending a message, cannot later deny having taken that action

A

Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A violation, or imminent threat of a violation, of a security policy or practice within the organization.

A

Security incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The occurrence of a violation of confidentiality when resources are made accessible to unauthorized entities.

A

Disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An attack in which access to sensitive information is gained and then removed from an organization.

A

Data exfiltration attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The unauthorized modification of information and a violation of the principle of integrity.

A

Alteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The unintended disruption of an authorized user’s legitimate access to information.

A

Denial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The risk of monetary damage to the organization as the result of a data breach.

A

Financial risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The risk that the negative publicity surrounding a security breach causes
the loss of goodwill among customers, employees, suppliers, and other stakeholders.

A

Reputational risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The risk that an organization will become less effective in meeting its major goals and objectives as a result of the breach.

A

Strategic risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The risk to the organization’s ability to carry out its day-to-day functions.

A

Operational risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The risk that a security breach causes an organization to run afoul of legal or regulatory requirements.

A

Compliance risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The risk of monetary damage to the organization as the result of a
data breach.

A

Financial risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The risk that the negative publicity surrounding a security breach causes
the loss of goodwill among customers, employees, suppliers, and other stakeholders.

A

Reputational risk

17
Q

When a security breach strikes an organization, the effects of that breach often extend beyond the walls of the breached organization, affecting customers, employees,and other individual stakeholders. The most common impact on these groups is the risk of identity theft posed by exposure of personally identifiable information (PII) to unscrupulous individuals.

A

Identity theft

18
Q

The risk that an organization will become less effective in meeting its major goals and objectives as a result of the breach.

A

Strategic risk

19
Q

The risk to the organization’s ability to carry out its day-to-day functions.

A

Operational risk

20
Q

The risk that a security breach causes an organization to run afoul of legal or regulatory requirements.

A

Compliance risk

21
Q

The safeguards or countermeasures used to address security vulnerabilities to reduce or manage risk.

A

Security controls

22
Q

During a gap analysis, the cybersecurity professional reviews the control objectives for a particular organization, system, or service and then examines the controls designed to achieve those objectives.

A

Gap analysis

23
Q

Controls that rely on technology.

A

Technical controls

24
Q

The mechanisms and procedures used to ensure or maintain security on a day-to-day basis.

A

Operational controls

25
Q

Sometimes called procedural controls, these are controls that are implemented through processes like awareness, training, and oversight.

A

Managerial controls

26
Q

Measures used to restrict physical access and prevent direct contact with systems or areas within a facility to protect assets and resources.

A

Physical controls