Cybersecurity 2 Flashcards

1
Q

Identifying, analyzing, and preserving criminal evidence within networks, computers, and electronic devices.

A

Computer Forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

skills from other areas of study or practice that can apply to different careers.

A

Transferable skills

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

these skills may apply to several professions, as well; however, they typically require knowledge of specific tools, procedures, and policies

A

Technical skills

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

tools that collect and analyze log data, or records of events such as unusual login behavior, and support analysts’ ability to monitor critical activities in an organization. This helps cybersecurity professionals identify and analyze potential security threats, risks, and vulnerabilities more efficiently.

A

Security information and event management (SIEM) tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cybersecurity analysts use this to monitor system activity and alerts for possible intrusions. For example, you might use it to monitor networks for signs of malicious activity, like unauthorized access to a network.

A

Intrusion detection systems (IDSs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This knowledge allows security teams to build stronger defenses against threat actor tactics and techniques. By staying up to date on attack trends and patterns, security professionals are better able to recognize when new types of threats emerge such as a new ransomware variant.

A

Threat landscape knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cybersecurity analysts need to be able to follow established policies and procedures to respond to incidents appropriately. For example, a security analyst might receive an alert about a possible malware attack, then follow the organization’s outlined procedures to start the ________?

A

Incident response processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly