Introduction to Cybersecurity Tools and Cyber Attacks Week Three Flashcards
Encrypting your email is an example of addressing which aspect of the CIA Triad?
Confidentiality
You fail to backup your files and then drop your laptop breaking it into many small pieces. You have just failed to address which aspect of the CIA Triad?
Avaliability
The use of digital signatures is an example of which concept?
Non-repudiation
Trudy forwards a message from Alice to Bob, but changes the timestamp on Alice’s message before sending it to make it look like it came in later. This is a violation of which aspect of the CIA Triad?
Integrity
Managers in the Singapore office at your company can access documents that managers in other offices cannot access, nor can non-manager employees in the Singapore office. Which two access criteria types were likely involved in setting this up?
Physical Location and Groups
In incident management, an event that has a negative impact on some aspect of the network or data is called what?
Incident
In incident management, a data inventory, data classification and data management process are part of which key concept?
E-Discovery
Which phase of the Incident Response Process do steps like Identify cyber security incident, Define objectives and investigate situation and Take appropriate action fall into?
Phase 2: Respond
In the context of security standards and compliance, which two of these items are goals of frameworks and best practices?
They help translate the business needs into technical or operational needs
They seek to improve performance, controls, and metrics
A company document that says employees may not do online shopping while at work would be which of the following?
Policy
Which three of these are compliance standards that must be adhered to by companies is some industries / countries?
SOX, PCI/DSS, and HIPPA
A method of evaluating computer and network security by simulating an attack on a computer system or network from external or internal threats is know as which of the following?
A pentest
The OWASP “Top 10” provides guidance on what?
The top 10 application vulnerabilities reported each year.
Which two key components are part of incident response?
Response Team and Investigation
Which is not part of the Sans Institutes Audit process?
Help to translate the business needs into technical or operational needs