Intro To Security Foundations Flashcards

1
Q

Someone who has access to an IT domain

A

User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer belonging to a user

A

Workstation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Workstations,hubs,switches, and routers

A

Local Area-Network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Internet and semi-private lines

A

Wide Area Network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Boundary between trusted and entrusted areas

A

LAN to WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A way to remotely access a workstation

A

Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Being free from danger

A

Security (the goal)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Measures taken to ensure safety

A

Security (the process)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Protection of electronic information

A

Information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Only authorized parties can access information

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ensure information can’t change

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Information is there for the right people when needed

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Any connected device

A

Internet of things (IoT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Something that compromises the confidentiality, integrity, or availability of information

A

Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An action that can cause potential harm

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Someone or something that poses a threat

A

Threat actor

17
Q

Something that makes it more likely a threat will take place

A

Vulnerability

18
Q

The intersection of that and vulnerability

A

Risk

19
Q

Something that has value to the organization, cannot be easily replaced, and is part of the organization’s identity

A

Asset