Course 1 Flashcards

Foundations of Cybersecurity

1
Q

Adversarial artificial intelligence

A

A technique that manipulates artificial intelligence
(AI) and machine learning (ML) technology to conduct attacks more efficiently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Antivirus software

A

A software program used to prevent, detect, and eliminate
malware and viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asset

A

An item perceived as having value to an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

The idea that data is accessible to those who are authorized to access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Business Email Compromise (BEC)

A

A type of phishing attack where a threat actor
impersonates a known source to obtain financial advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cloud security

A

The process of ensuring that assets stored in the cloud are properly
configured and access to those assets is limited to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Compliance

A

The process of adhering to internal standards and external regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Computer virus

A

Malicious code written to interfere with computer operations and
cause damage to data and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Confidentiality

A

Only authorized users can access specific assets or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confidentiality, integrity, availability (CIA) triad

A

A model that helps inform how
organizations consider risk when setting up systems and security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cryptographic attack

A

An attack that affects secure forms of communication
between a sender and intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cybersecurity (or security)

A

The practice of ensuring confidentiality, integrity, and
availability of information by protecting networks, devices, people, and data from
unauthorized access or criminal exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Database

A

An organized collection of information or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data point

A

A specific piece of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hacker

A

Any person who uses computers to gain access to computer systems,
networks, or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hacktivist

A

A person who uses hacking to achieve a political goal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Health Insurance Portability and Accountability Act (HIPAA)

A

A U.S. federal law
established to protect patients’ health information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Integrity

A

The idea that the data is correct, authentic, and reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Internal threat

A

A current or former employee, external vendor, or trusted partner who poses a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Intrusion detection system (IDS)

A

An application that monitors system activity and alerts on possible intrusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Linux

A

An open-source operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Log

A

A record of events that occur within an organization’s systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

National Institute of Standards and Technology (NIST) Cyber Security Framework
(CSF)

A

A voluntary framework that consists of standards, guidelines, and best
practices to manage cybersecurity risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Malware

A

Software designed to harm devices or networks

25
Q

Network protocol analyzer (packet sniffer)

A

A tool designed to capture and analyze data traffic within a network

26
Q

Network security

A

security: The practice of keeping an organization’s network infrastructure secure from unauthorized access

27
Q

Open Web Application Security Project (OWASP)

A

A non-profit organization
focused on improving software security

28
Q

Order of volatility

A

A sequence outlining the order of data that must be preserved
from first to last

29
Q

Password attack

A

An attempt to access password secured devices, systems,
networks, or data

30
Q

Personally identifiable information (PII)

A

Any information used to infer an individual’s identity

31
Q

Phishing

A

The use of digital communications to trick people into revealing sensitive data or deploying malicious software

32
Q

Physical attack

A

A security incident that affects not only digital but also physical
environments where the incident is deployed

33
Q

Physical social engineering

A

An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location

34
Q

Privacy protection

A

The act of safeguarding personal information from unauthorized
use

35
Q

Programming

A

A process that can be used to create a specific set of instructions for a
computer to execute tasks

36
Q

Protected health information (PHI)

A

(PHI): Information that relates to the past, present, or future physical or mental health or condition of an individual

37
Q

Protecting and preserving evidence

A

The process of properly working with fragile and volatile digital evidence

38
Q

Security architecture

A

A type of security design composed of multiple components,
such as tools and processes, that are used to protect an organization from risks and external threats

39
Q

Security controls

A

Safeguards designed to reduce specific security risks

40
Q

Security ethics

A

Guidelines for making appropriate decisions as a security
professional

41
Q

Security frameworks

A

Guidelines used for building plans to help mitigate risk and
threats to data and privacy

42
Q

Security governance

A

Practices that help support, define, and direct security efforts
of an organization

43
Q

Security information and event management (SIEM)

A

An application that collects
and analyzes log data to monitor critical activities in an organization

44
Q

Security posture

A

An organization’s ability to manage its defense of critical assets and
data and react to change

45
Q

Sensitive personally identifiable information (SPII)

A

A specific type of PII that falls
under stricter handling guidelines

46
Q

Social engineering

A

A manipulation technique that exploits human error to gain
private information, access, or valuables

47
Q

Social media phishing

A

A type of attack where a threat actor collects detailed
information about their target on social media sites before initiating the attack

48
Q

Spear phishing

A

A malicious email attack targeting a specific user or group of users,
appearing to originate from a trusted source

49
Q

SQL (Structured Query Language)

A

A programming language used to create, interact with, and request information from a database

50
Q

Supply-chain attack

A

An attack that targets systems, applications, hardware, and/or
software to locate a vulnerability where malware can be deployed

51
Q

Technical skills

A

Skills that require knowledge of specific tools, procedures, and
policies

52
Q

Threat

A

Any circumstance or event that can negatively impact assets

53
Q

Threat actor

A

Any person or group who presents a security risk

54
Q

Transferable skills

A

Skills from other areas that can apply to different careers

55
Q

USB baiting

A

An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and install to unknowingly infect a network

56
Q

Virus

A

refer to “computer virus”

57
Q

Vishing

A

The exploitation of electronic voice communication to obtain sensitive
information or to impersonate a known source

58
Q

Watering hole attack

A

A type of attack when a threat actor compromises a website
frequently visited by a specific group of users