Foundations of Cybersecurity Flashcards

Module One

1
Q

What is the practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation?

A

Cybersecurity (or security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the CIA triad stand for in cybersecurity?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is cloud security?

A

The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an internal threat?

A

A current or former employee, external vendor, or trusted partner who poses a security risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is network security?

A

The practice of keeping an organization’s network infrastructure secure from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is personally identifiable information (PII)?

A

Any information used to infer an individual’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is sensitive personally identifiable information (SPII)?

A

A specific type of PII that falls under stricter handling guidelines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is security posture?

A

An organization’s ability to manage its defense of critical assets and data and react to change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are technical skills?

A

Skills that require knowledge of specific tools, procedures, and policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a threat actor?

A

Any person or group who presents a security risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is compliance in cybersecurity?

A

The process of adhering to internal standards and external regulations to avoid fines and security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are security frameworks?

A

Guidelines used for building plans to help mitigate risks and threats to data and privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are security controls?

A

Safeguards designed to reduce specific security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the primary responsibilities of an entry-level security analyst?

A

Monitor systems, protect information, and search for weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What enables security professionals to review an organization’s security records, activities, and related documents?

A

Security audits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do security teams bring value to an organization?

A

Achieving regulatory compliance and protecting against external and internal threats.

17
Q

Name two transferable skills important for cybersecurity professionals.

A

Communication and problem-solving.

18
Q

Name two technical skills needed to become an entry-level security analyst.

A

Programming and data analysis.

19
Q

Who identifies, analyzes, and preserves criminal evidence within networks, computers, and electronic devices?

A

Digital forensic investigators.

20
Q

What are examples of sensitive personally identifiable information (SPII) that cybersecurity professionals need to protect?

A

Medical records and bank account numbers

21
Q

What is the purpose of Security Information and Event Management (SIEM) tools?

A

To collect and analyze log data, monitor critical activities, and identify and analyze potential security threats, risks, and vulnerabilities.

22
Q

What do intrusion detection systems (IDSs) do?

A

Monitor system activity and alert for possible intrusions.

23
Q

Why is knowledge of the threat landscape important for cybersecurity analysts?

A

It allows security teams to build stronger defenses against threat actor tactics and techniques.

24
Q

What certification does the Google Cybersecurity Certificate help prepare you for?

A

CompTIA Security+ exam.

25
Q

What is programming used for in cybersecurity?

A

Automating tasks, reviewing web traffic, and alerting suspicious activity.