Fundamentals of Security Flashcards

SECTION 2

1
Q

Protecting data and information from unauthorized access, modification,
disruption, disclosure, and destruction

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protecting the systems (e.g., computers, servers, network devices) that hold and
process critical data

A

Information Systems Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality, integrity, availability

A

CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ensures information is accessible only to authorized personnel (e.g.,
encryption)

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ensures data remains accurate and unaltered (e.g., checksums)

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ensures information and resources are accessible when needed (e.g.,
redundancy measures)

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Guarantees that an action or event cannot be denied by the involved parties
(e.g., digital signatures)

A

Non-Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An extension of the CIA triad with the addition of non-repudiation and
authentication

A

CIANA Pentagon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authentication, Authorization, Accounting

A

Triple A’s of Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Verifying the identity of a user or system (e.g., password checks)

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Determining actions or resources an authenticated user can access (e.g.,
permissions)

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tracking user activities and resource usage for audit or billing purposes

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Technical
Managerial
Operational
Physical

A

Security Control Categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Preventative
Deterrent
Detective
Corrective
Compensating
Directive

A

Security Control Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Operates on the principle that no one should be trusted by default

A

Zero Trust Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To achieve zero trust, we use the

A

Control plane and data plane

17
Q

Adaptive identity, threat scope reduction, policy-driven access
control, and secured zones

A

Control Plane

18
Q

Subject/system, policy engine, policy administrator, and
establishing policy enforcement points

A

Data Plane