foundations Flashcards

1
Q

Compliance

A

the process of adhering to internal standards and external regulations and enables organizations to avoid fines and security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security frameworks

A

guidelines used for building plans to help mitigate risks and threats to data and privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security controls

A

safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security posture

A

an organization’s ability to manage its defense of critical assets and data and react to change. A strong security posture leads to lower risk for the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

threat actor

A

any person or group who presents a security risk. This risk can relate to computers, applications, networks, and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

internal threat

A

current or former employee, an external vendor, or a trusted partner who poses a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network security

A

the practice of keeping an organization’s network infrastructure secure from unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud security

A

the process of ensuring that assets stored in the cloud are properly configured, or set up correctly, and access to those assets is limited to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Programming

A

a process that can be used to create a specific set of instructions for a computer to execute tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security information and event management (SIEM) tools:

A

collect and analyze log data, or records of events such as unusual login behavior, and support analysts’ ability to monitor critical activities in an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Intrusion detection systems (IDSs)

A

monitor system activity and alerts for possible intrusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threat landscape knowledge

A

allows security teams to build stronger defenses against threat actor tactics and techniques-staying up to date on attack trends and patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

computer virus

A

malicious code written to interfere with computer operations and cause damage to data and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

worm

A

type of computer virus that can duplicate and spread on its own without human involvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Social engineering

A

a manipulation technique that exploits human error to gain private information, access, or valuables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Phishing

A

the use of digital communications to trick people into revealing sensitive data or deploying malicious software

17
Q

CSIRTs

A

computer security incident response teams

18
Q

Security and risk management

A

focuses on defining security goals and objectives, risk mitigation, compliance, business continuity, and the law

19
Q

asset security

A

focuses on securing digital and physical assets. It’s also related to the storage, maintenance, retention, and destruction of data

20
Q

security architecture and engineering

A

optimizing data security by ensuring effective tools, systems, and processes are in place

21
Q

communication and network security

A

managing and securing physical networks and wireless communications.

22
Q

identity and access management

A

focuses on keeping data secure, by ensuring users follow established policies to control and manage physical assets, like office spaces, and logical assets, such as networks and applications

23
Q

security assessment and testing

A

conducting security control testing, collecting and analyzing data, and conducting security audits to monitor for risks, threats, and vulnerabilities

24
Q

security operations

A

conducting investigations and implementing preventative measures

25
Q

software development security

A

using secure coding practices, which are a set of recommended guidelines that are used to create secure applications and services