Deck Flashcards

1
Q

What is cybersecurity?

A

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is cloud security?

A sub-field

A

The process of ensuring that assets stored in the cloud are properly set up correctly and access to those assets is limited to authorized users

Specifically focuses on the protection of data, application, and infratstructure in the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an internal threat?

A

A current or former employee, external vendor, or trusted partner who poses as a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is network security?

A

The practice of keeping an organization’s network infrastructure secure from unauthorized access

This includes data, services, systems, and devices that are stored in an organization’s network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is PII? What does it stand for?

A

Personal Identifiable Information. Any information used to infer an individual’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is security posture?

A

An organization’s ability to manage its defense of critical assets and data and react to change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is SPII? What does it stand for?

A

Sensitive Personal Identifiable Information. A specific type of PII that falls under stricter handling guidelines/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is technical skills?

A

Skills that require knowledge of specific tools, procedures, and policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a threat?

A

Any circumstance or event that can negatively impact assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a transferable skill?

A

Skills from other areas that can apply to different careers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a threat actor?

A

Any person or group who presents a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is to install detection software?

A

security professionals collaborating with information technical teams to deploy an application that helps identify risks and vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is identity theft?

A

an individual having their personal information stolen and could commit fraud or impersonate them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is regulatory compliance

A

laws and guidelines that require implementation of security standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are security analysts responsible for?

There are 4 points

A
  • protecting computer and network systems
  • search for weaknesses
  • installing prevention softwares
  • conducting periodic security audits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is security audit?

A

A review of an organization’s security records, activities, and other related documents

13
Q

What are the 2 parts to an entry-level cybersecurity prof.?

A
  • Operations: Responding to detections and doing investigations
  • Projects: Working with other teams to build new detections or improve the current detections
14
Q

What is a playboook?

A

A list of how to go through a certain detection, and what the analyst needs to look at in order to investigate those incidents

15
Q

What is security framework?

A

Guidelines used for building plans to help mitigate risks and threats to data and privacy

16
Q

What are security controls?

A

Safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture

17
Q

What is a cloud?

A

A network made up of a collection of servers or computers that store resources and data in remote physical locations known as data centers that can be accessed via the internet

17
Q

What type of information falls under PII?

A
  • Full Name
  • DOB
  • Physical Address
  • Phone number
  • Email Address
  • IP (Internet Protocol)
18
Q

What type of information falls under SPII?

A
  • SSN
  • Medical Information
  • Financial Information
  • Biometric Data (Face ID)
19
Q

What type of security task does computer forensics do?

A

A security professional receives an alert about an unknown user accessing a system within their organization. They attempt to identity, analyze, and preserve the associated criminal evidence.

20
Q

What is SIEM? What does it stand for?

A

Security information and event management. Tools enable security professionals to identify and analyze threats, risks and vulnerabilites

21
Q

What are the proficiencies of transferable skills?

A
  • Written and verbal communication
  • Data Analysis
  • Problem-Solving
22
Q

What are DIGITAL FORENSIC INVESTIGATORS in charge of?

A

Identifying, Anlyzing, and preserving criminal evidence within networks, computers, and electronic devices