Introduction Flashcards

1
Q

What is Cybersecurity

A

Cybersecurity is the ongoing effor to protect individuals, organizations and governments from digital attacks by protecting networked systems and data from unauthorized use or harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The 3 Levels of Cybersecurity?

A
  1. Personal
  2. Organizational
  3. Government
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the most common types of Identity Theft?

A
  • Medical Theft
  • Banking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of cyberwarfare?

A

To gather compromising information or to impact infraestructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Behaviour-based approach to CyberSecurity?

A

Behavior-based security is a form of threat detection that involves capturing and analyzing a flow of communication in order to identify any anomalies and changes in nonormal patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the 5 steps of Pentesting?

A
  1. Planning
  2. Scanning
  3. Gaining Access
  4. Maintaining access
  5. Analysis and reporting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the main goal of Netflow?

A

Establish baseline behaviors in more than 90 attributes, such as source and destination IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What CSIRT Stands for?

Team

A

Computer Security Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What FIRST Stands for?

Forum

A

Forum of Incident Response and Security Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What NSIE Stands for?

Information Exchange

A

National Safety Information Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What DSIE Stands for

Information Exchange

A

Defense Security Information Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What DNS-OARC stands for?

Research Center

A

DNS Operations Analysis and Research Center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What SIEM stands for?

Cisco’s approach tools

A

Security Information and Event Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the main goal of SIEM?

A

Facilitate early detection of cyber attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How SIEM Works?

A

Collecting and Analyzing Security Alerts, Logs and other data (Real time and historic) from security devices on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What DLP Stands for?

Cisco’s approach tools

A

Data Loss Prevention

17
Q

What is the main goal of DLP Systems?

Cisco’s approach tools

A

Stop sensitive data from being stolen or escaping a network.

18
Q

How DLP systems works?

Cisco’s approach tools

A

Monitoring and protecting data in three diferent states:
* In use
* In motion
* At rest

19
Q

What ISE stands for?

A

Identity Services Engine

20
Q

What tool can be used to provide a list of Open Ports on Network Devices?

A

Nmap

21
Q

What name is given to a device that controls or filters traffic going in or out of the network?

A

Firewall

22
Q

What tool can identify malicious traffic by comparing packet contents to known attack signatures?

A

Intrusion Detection System (IDS)

23
Q

What is the correct definition of risk management?

A

Identifying and assessing risk to determine the severity of threats

24
Q

“With careful planning and consideration, some risks can be completely eliminated”

Is that statement true or false?

A

False

24
Q

What’s the difference between a Hacker and a Cybersecurity Professional?

A

Cybersecurity Professionals must work within legal boundaries.

25
Q

What are On-path attacks?

A

Attacks in wich the attackers places themselves between two devices.

26
Q
A