Domain II – Information Security - Section B: Emerging Technologies and Cybersecurity Flashcards

1
Q

Bring Your Own Device (BYOD)

A

is an alternative strategy allowing employees and
other users to utilize a personally selected and purchased client device to execute enterprise applications and access data. Typically, it spans smartphones and tablets, but the strategy may also be used for PCs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The Internet of Things (IoT)

A

refers to the scenario in which physical and virtual objects are provided with unique IP addresses for internet connectivity without requiring human interaction.
=> Security systems, sensors, thermostats, vehicles, home appliances, alarms, vending machines
and other everyday objects can be connected to the internet to communicate andinteract with the external environment and to provide for remotely monitoring and
controlling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cloud Computing

A

is a style of computing in which IT‐enabled capabilities are delivered as a service using internet technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cybersecurity

A

refers to the technologies, processes, and practices designed to protect an organization’s information assets from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hacking

A

A security hacker is a skilled computer expert who attempts to breach defenses and exploit weaknesses in an information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Piracy

A

is the unauthorized use or reproduction of another’s work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Tampering

A

is the deliberate altering or modifying of information, a product, a package, or system through unauthorized channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ransomware Attacks

A

is a type of malware that blocks access to victim’s data or threatens to publish it unless a ransom is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Phishing Attacks

A

is a type of electronic mail attack that attempts to convince a user that the originator is genuine, but with the intention of obtaining information for use in social engineering or other unauthorized purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cybersecurity Governance

A

The internal audit activity should understand the organization’s cybersecurity governance. Governance may include clarifying roles and responsibilities, establishing accountability, adopting a multiyear strategy, and prioritizing action plans to include strategic collaboration with multiple stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly