Introduction to Defensive Cybersecurity Flashcards

1
Q

What is the primary focus of Defensive Cybersecurity?

A

Proactive strategies to identify, mitigate, and prevent cyber threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What three principles are essential in Defensive Cybersecurity?

A

Confidentiality, integrity, and availability of data and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of risk assessments in Defensive Cybersecurity?

A

To identify, analyze, and evaluate potential vulnerabilities and prioritize security efforts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is threat modeling?

A

Analyzing potential threats and attack methods to implement effective countermeasures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is defense-in-depth?

A

A strategy involving multiple layers of security controls to minimize vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are examples of security controls in defense-in-depth?

A

Firewalls, intrusion detection systems, secure coding, encryption, and user training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is security awareness training important?

A

It helps individuals recognize and respond to cyber threats and fosters a culture of cybersecurity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are common cyber attack vectors?

A

Malware, phishing, ransomware, and password attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are examples of social engineering techniques?

A

Phishing emails, pretexting, baiting, quid pro quo, and tailgating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is incident response crucial in Defensive Cybersecurity?

A

It minimizes the impact of security incidents and helps restore normal operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does incident response involve?

A

Containing the incident, preserving evidence, and communicating with stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are legal considerations in Defensive Cybersecurity?

A

Compliance with data protection, privacy, and cybersecurity laws and regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are ethical considerations in Defensive Cybersecurity?

A

Protecting privacy, respecting intellectual property, and acting in the best interest of stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly