Intro to Security Concepts Flashcards

Week 3

1
Q

What is the AAA Model in cybersecurity?

A

The AAA Model stands for Authentication, Authorization, and Accounting, ensuring secure access control and tracking user activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Gap Analysis?

A

A Gap Analysis identifies differences between current security measures and desired standards to improve cybersecurity posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is ISO 27001?

A

ISO 27001 is an international standard for information security management, helping organizations protect sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the NIST Cybersecurity Framework (CSF)?

A

NIST CSF is a security framework that helps organizations identify, protect, detect, respond to, and recover from cyber threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Zero Trust?

A

Zero Trust is a security model that assumes no user or device is automatically trusted, requiring continuous verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Zero-Day Vulnerability?

A

A Zero-Day Vulnerability is a security flaw unknown to vendors, leaving systems exposed to attacks until patched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is PII (Personally Identifiable Information)

A

PII is any data that can identify an individual, such as names, addresses, Social Security numbers, and biometric data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What types of information are PII?

A

PII includes names, emails, phone numbers, government IDs, financial data, biometric records, and personal addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does PII relate to cybersecurity?

A

Protecting PII is a key cybersecurity goal to prevent identity theft, fraud, and privacy breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Data Breach?

A

A Data Breach occurs when sensitive or confidential data is accessed, stolen, or exposed without authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Are Security and Data Breaches the same?

A

No. Security breaches are unauthorized access attempts, while data breaches involve stolen or exposed sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Deception & Disruption Technology?

A

Cyber tools that mislead attackers, detect threats, and disrupt malicious activity before damage occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Ethics in cybersecurity?

A

Cybersecurity ethics ensures responsible use of technology, protecting privacy, data integrity, and preventing harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ethical hacking is characterized by which of the following?

A

Testing security systems with permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the FIRST action you should take in response to an unauthorized intrusion into the network?

A

Preserve evidence and begin documenting the incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a key principle of the Zero Trust security model?

A

Never trust, always verify

17
Q

What is the focus of the ISO/IEC 27001 standard?

A

Information security management

18
Q

What is the primary goal of conducting a gap analysis in cybersecurity?

A

Identifying the differences between current and desired security postures

19
Q

Which component of the AAA model is responsible for determining what an authenticated user is allowed to do?

A

Authorization

20
Q

What does the Integrity component of the CIA Triad primarily ensure?

A

Data is trustworthy and complete

21
Q

What is the primary role of a honeypot in security architecture?

A

To attract and monitor potential attackers

22
Q

What technology can be used to analyze real-life attack patterns?