Domain 5 Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Security Operations?

A

The day-to-day activities and procedures used to protect an organization’s information assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Security Monitoring?

A

The process of continuously observing systems and networks to detect potential security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an Incident?

A

An event that has or could negatively impact the confidentiality, integrity, or availability of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an Event?

A

Any observable occurrence in a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Physical Security?

A

Measures designed to prevent unauthorized physical access to facilities, equipment, and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Environmental Security?

A

Protecting information systems from natural or environmental hazards such as fire, flood, or extreme temperatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Social Engineering?

A

The use of deception to manipulate individuals into divulging confidential or personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Insider Threat?

A

A threat originating from within the organization by trusted individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Tailgating?

A

An unauthorized person gaining physical access to a secure area by following an authorized person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Piggybacking?

A

Allowing someone to enter a secure area by holding the door open for them, often knowingly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Security Operations Center (SOC)?

A

A centralized team that monitors, detects, responds to, and mitigates security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Change Management?

A

The process of controlling changes to systems and networks to minimize risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Configuration Management?

A

Maintaining system configurations in a secure and consistent state to prevent unauthorized changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Security Incident Report?

A

A document detailing the events, impacts, and responses related to a security incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Data Loss Prevention (DLP)?

A

Technologies and processes used to prevent unauthorized access, transfer, or leakage of sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Mobile Device Management (MDM)?

A

A system used to secure, monitor, and manage mobile devices accessing enterprise resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Encryption at Rest?

A

Protecting stored data by encrypting it on the storage device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Encryption in Transit?

A

Protecting data while it is being transmitted across networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Log Management?

A

Collecting, storing, and analyzing logs to support security monitoring and incident investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the Purpose of Monitoring Alerts?

A

To notify security teams of potential threats or suspicious activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Data Retention Policy?

A

A policy that defines how long data must be stored and how it should be disposed of.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Chain of Custody in security operations?

A

Maintaining documented control over evidence to preserve its integrity for legal proceedings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is Redundancy in security operations?

A

Using duplicate systems or components to ensure continued operations if one part fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is High Availability (HA)?

A

Designing systems to remain operational with minimal downtime, even during component failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is Disaster Recovery Testing?

A

Validating that recovery procedures work as expected in a real-world or simulated event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a Security Posture?

A

The overall security status of an organization’s software, networks, services, and information.

28
Q

What is a Vulnerability Management Program?

A

A continuous process to identify, classify, remediate, and mitigate vulnerabilities.

29
Q

What is a False Positive in security monitoring?

A

An alert that incorrectly indicates the presence of a threat.

30
Q

What is a False Negative in security monitoring?

A

A missed detection where a real threat goes unnoticed.

31
Q

What is Penetration Testing?

A

Simulated cyberattacks against systems to identify and exploit vulnerabilities.

32
Q

What is Risk Mitigation?

A

Taking actions to reduce the likelihood or impact of a risk.

33
Q

What is the Principle of Least Functionality?

A

Systems should be configured to provide only essential capabilities.

34
Q

What is Data Disposal?

A

The process of securely removing data when it is no longer needed.

35
Q

What is a Secure Area?

A

A physical space protected by security controls to restrict access.

36
Q

What is a Mantrap?

A

A physical security control that uses two interlocking doors to restrict access to secure areas.

37
Q

What is Sensitive Data?

A

Information that must be protected due to legal, regulatory, or ethical requirements.

38
Q

What is Monitoring Baseline?

A

A standard level of activity used to detect abnormal behavior in systems.

39
Q

What is Log Aggregation?

A

Combining logs from multiple sources into a centralized system for analysis.

40
Q

What is Patch Management?

A

The process of applying updates to software to fix security vulnerabilities.

41
Q

What is the Goal of Physical Access Controls?

A

To prevent unauthorized individuals from accessing secure environments.

42
Q

What is a Backup Policy?

A

Guidelines that define how and when data backups are performed and managed.

43
Q

What is Business Continuity in operations?

A

Maintaining business functions or quickly resuming them after a disruption.

44
Q

What is Escalation in Incident Response?

A

Raising an incident to a higher level of authority or expertise when necessary.

45
Q

What is the purpose of Environmental Controls?

A

To protect systems and equipment from environmental hazards.

46
Q

What is Secure Disposal of Media?

A

Safely destroying or wiping storage media to prevent data recovery.

47
Q

What is CCTV in security?

A

Closed-circuit television used for surveillance and monitoring physical spaces.

48
Q

What is an Access Log?

A

A record of who accessed a system or facility and when.

49
Q

What is a Panic Button in security?

A

A device that quickly alerts security personnel during emergencies.

50
Q

What are examples of Environmental Security threats?

A

Fire, flood, power outages, temperature extremes.

51
Q

Why is Redundancy important in operations?

A

To ensure continuous service even when components fail.

52
Q

How can a SOC improve security posture?

A

By providing continuous monitoring, detection, and response to threats.

53
Q

What does DLP protect against?

A

Unauthorized access, transmission, or leakage of sensitive data.

54
Q

How does Change Management help security?

A

By ensuring changes are reviewed and approved, reducing the risk of vulnerabilities.

55
Q

What is an example of Social Engineering?

A

A phishing email tricking an employee into revealing their password.

56
Q

How can mobile device management (MDM) enhance security?

A

By enforcing security policies like encryption and remote wipe on mobile devices.

57
Q

What is the risk of poor data disposal practices?

A

Sensitive information could be recovered and exploited.

58
Q

How do encryption at rest and encryption in transit differ?

A

Encryption at rest protects stored data; encryption in transit protects data being transmitted.

59
Q

How can backup policies support business continuity?

A

By ensuring critical data is recoverable after an incident.

60
Q

Why is log management important for incident response?

A

Logs provide critical evidence and context for understanding incidents.

61
Q

How do false positives and false negatives affect security monitoring?

A

False positives waste time; false negatives allow real threats to go undetected.

62
Q

Why are secure areas and mantraps used in facilities?

A

To strictly control and monitor who accesses sensitive physical spaces.

63
Q

How does vulnerability management improve security operations?

A

By proactively addressing known weaknesses before attackers exploit them.

64
Q

What is the importance of an After Action Report?

A

To analyze incident response efforts and improve future preparedness.

65
Q

How does environmental monitoring support operational security?

A

By detecting hazards like smoke, water leaks, or temperature extremes early.