Foundations of Cybersecurity Flashcards

Module Three

1
Q

What are security frameworks?

A

Guidelines used for building plans to help mitigate risks and threats to data and privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are security controls?

A

Safeguards designed to reduce specific security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the confidentiality, integrity, and availability (CIA) triad help inform?

A

How organizations consider risk when setting up systems and security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the NIST Cybersecurity Framework (CSF)?

A

A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is compliance in cybersecurity?

A

The process of adhering to internal standards and external regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name two examples of compliance standards.

A

General Data Protection Regulation (GDPR) and Health Insurance Portability and Accountability Act (HIPAA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary purpose of the General Data Protection Regulation (GDPR)?

A

To protect the processing of E.U. residents’ data and their right to privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the Health Insurance Portability and Accountability Act (HIPAA) protect?

A

Patients’ health information, also known as protected health information (PHI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the role of the Federal Risk and Authorization Management Program (FedRAMP)?

A

To standardize security assessment, authorization, monitoring, and handling of cloud services and product offerings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the primary purposes of security frameworks?

A

Securing financial information, aligning security with business goals, identifying security weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the core components of security frameworks?

A

Identifying and documenting security goals, monitoring and communicating results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an example of a security control?

A

Implementing strict password policies on workstations to reduce the risk of password theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are assets in the context of cybersecurity?

A

Items perceived as having value to an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why are disgruntled employees considered dangerous threat actors?

A

They often know where to find sensitive information, can access it, and may have malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is privacy protection?

A

Safeguarding personal information from unauthorized use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What ethical principle involves adhering to compliance regulations?

A

Laws.

17
Q

What is the primary goal of the Payment Card Industry Data Security Standard (PCI DSS)?

A

To ensure that organizations storing, accepting, processing, and transmitting credit card information do so in a secure environment.

18
Q

What is the function of security governance?

A

Practices that help support, define, and direct security efforts of an organization.

19
Q

What is security architecture?

A

A type of security design composed of multiple components, such as tools and processes, that are used to protect an organization from risks and external threats.

20
Q

What is a hacktivist?

A

A person who uses hacking to achieve a political goal.

21
Q

What does integrity in the CIA triad mean?

A

The idea that the data is correct, authentic, and reliable

22
Q

What does availability in the CIA triad mean?

A

The idea that data is accessible to those who are authorized to access it.

23
Q

What is the ethical obligation of security professionals regarding private information?

A

To secure private information, identify security vulnerabilities, manage organizational risks, and align security with business goals.

24
Q

What is protected health information (PHI)?

A

Information that relates to the past, present, or future physical or mental health or condition of an individual.

25
Q

What should a security professional do if asked to share employee information through personal communication channels against company policies?

A

Respectfully decline and remind the requester of the organization’s guidelines.