Cybersecurity Flashcards

1
Q

What institute has instilled a framework for best practices in managing cyber security risks?

A

National Institute of Standards and Technology (NIST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the five functions the National Institute of Standards and Technology (NIST) bases their framework for cybersecurity on?

A

Identify, Protect, Detect, Respond, Restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To “know how you can be attacked” refers to what function in the NIST cybersecurity framework?

A

Identify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

To “put controls in place to prevent the attack” refers to what function in the NIST cybersecurity framework?

A

Protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

To “put controls in place to know when you’ve been attacked” refers to what function in the NIST cybersecurity framework?

A

Detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To “know how you can stop the attack once it’s been detected” refers to what function in the NIST cybersecurity framework?

A

Respond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

To “plan how you will restore normal operations” refers to what function in the NIST cybersecurity framework?

A

Restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In the context of cybersecurity, what keyword is used to “refer to the idea that data is there when it’s needed”?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In the context of cybersecurity, what keyword is used to “refer to the idea that data is accurate and hasn’t been tampered with”?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the context of cybersecurity, what keyword is used to “refer to the idea that data is only accessible by authorized people”?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In the context of cybersecurity, what keyword is used to “refer to a set of data that has value to the organization”?

A

Information asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In the context of cybersecurity, what keyword is used to “refers to services used or goods purchased to prevent a threat actor from exploiting a vulnerability”?

A

Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is one definition of Cybersecurity?

A

The ability to protect or defend the use of an enterprise’s internet-connected systems and data from an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What form of cyberattack makes things unavailable to authorized users?

A

Denial of Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What form of cyberattacked tricks users into divulging their credentials to an attacked?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are six key cybersecurity controls?

A
  • Patch updates
  • Application whitelisting
  • System hardening
  • Least privileged access
  • MFA authentication
  • Backup systems and data