Foundations: Module 1 Flashcards

1
Q

Cybersecurity

A

Protecting systems and data from digital threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Compliance

A

Following rules and laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Frameworks

A

Plans that help protect data and reduce risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security Controls

A

Steps taken to lower security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Posture

A

How well an organization can defend itself from attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threat Actor

A

Anyone who could cause problems for computers, apps, networks, or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internal Threat

A

A security risk caused by someone you trust, like an employee or partner. It can happen on purpose or by mistake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network Security

A

Protecting a company’s network and everything on it—like data, systems, and devices—from people who shouldn’t have access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud Security

A

Keeping cloud data and systems safe by setting them up correctly and only letting the right people use them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Programming

A

Writing instructions for a computer to do things like automate tasks, check web traffic, and find suspicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Information and Event Management (SIEM) Tools

A

Tools that gather and study log data—like strange logins—to help find and understand security problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Intrusion detection systems (IDSs)

A

Watch what’s happening on a system and warn analysts if someone breaks in or does something bad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threat Landscape Knowledge

A

Keeping up with new attack methods so security teams can spot threats and improve protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Incident Response

A

Steps taken after a security problem happens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Personally Identifiable Information (PII)

A

Info that can be used to figure out who someone is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Sensitive Personally Identifiable Information (SPII)

A

A special kind of personal info that needs extra protection.