Cybersecurity Flashcards

1
Q

What institute has instilled a framework for best practices in managing cyber security risks?

A

National Institute of Standards and Technology (NIST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the five functions the National Institute of Standards and Technology (NIST) bases their framework for cybersecurity on?

A
  • Identify
  • Protect
  • Detect
  • Respond
  • Restore
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To “know how you can be attacked” refers to what function in the NIST cybersecurity framework?

A

Identify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

To “put controls in place to prevent the attack” refers to what function in the NIST cybersecurity framework?

A

Protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

To “put controls in place to know when you’ve been attacked” refers to what function in the NIST cybersecurity framework?

A

Detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To “know how you can stop the attack once it’s been detected” refers to what function in the NIST cybersecurity framework?

A

Respond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

To “plan how you will restore normal operations” refers to what function in the NIST cybersecurity framework?

A

Restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In the context of cybersecurity, what keyword is used to “refer to the idea that data is there when it’s needed”?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In the context of cybersecurity, what keyword is used to “refer to the idea that data is accurate and hasn’t been tampered with”?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the context of cybersecurity, what keyword is used to “refer to the idea that data is only accessible by authorized people”?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In the context of cybersecurity, what keyword is used to “refer to a set of data that has value to the organization”?

A

Information asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In the context of cybersecurity, what keyword is used to “refers to services used or goods purchased to prevent a threat actor from exploiting a vulnerability”?

A

Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What form of cyberattack makes things unavailable to authorized users?

A

Denial of Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What form of cyberattacked tricks users into divulging their credentials to an attacked?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are six key cybersecurity controls?

A
  • Patch updates
  • Application whitelisting
  • System hardening
  • Least privileged access
  • MFA authentication
  • Backup systems and data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List three ways malicious actors harm organizations

A
  • Unauthorized access
  • Data unavailability
  • Data tampering
17
Q

What three terms ensure data is protected & accurate?

A
  • Availability
  • Integrity
  • Confidentiality
18
Q

What process estimates the attack probability and impact a service provides, prioritizing issues found?

A

Cyber risk assessment

19
Q

Three ways attackers compromise systems?

A
  • Exploit misconfigurations
  • Exploit software vulnerabilities
  • Use real credentials
20
Q

In the context of Cyber Security, what are three control types?

A
  • Preventative (e.g., passwords, updates, training)
  • Detective (e.g., antivirus, monitoring)
  • Corrective (e.g., incident response, data recovery)
21
Q

In the context of Cyber Security, what are controls? Why are they important?

A

Technical/procedural defenses to mitigate vulnerabilities and reduce cyber risk.

22
Q

Steps in a cyber risk assessment?

A
  1. Identify assets.
  2. Identify threats.
  3. Assess vulnerabilities.
  4. Analyze impact.
  5. Determine likelihood.
  6. Prioritize risks.