Lecture 1 HW Flashcards

1
Q

What is the primary focus of Infosec’s C.I.A. triad?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which term is used to define a category of objects, persons, or entities that represents a potential danger to an asset?

A

Threat Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the term “Availability” refer to in information security?

A

Ability to access data when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the focus of Personal Security within an organization’s security layers?

A

Protecting individual privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which organization is responsible for the creation of the McCumber Cube security model?

A

CNSS
(Committee on National Security Systems)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What term is used to describe the process of taking advantage of weaknesses in a system?

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

According to the lecture, what does cybersecurity focus on?

A

Protecting data during transmission
Defending IT assets from attack
Preventing unauthorized data access

(HW Answer: All of the above)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the role of a Data Custodian in an organization?

A

Maintains and protects information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What term refers to a senior executive who promotes an information security project and ensures its support at the highest levels of an organization?

A

Champion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the primary goal of Operations Security (OPSEC)?

A

Protecting details of activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the broader practice of defending IT assets from attack called?

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What term is used to define the process of protecting information from unauthorized access, use, and disclosure?

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the term “Integrity” refer to in the context of information security?

A

Maintaining data accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the term used to describe an unauthorized assumption of another’s identity?

A

Masquerading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What term refers to a false denial by an entity that it sent or created something?

A

Repudiation of Origin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which type of attack aims to temporarily inhibit service?

A

Delay

17
Q

What is the primary focus of security mechanisms?

A

Enforcing security policies

18
Q

Which security mechanism focuses on ensuring that data remains intact and unmodified?

A

Integrity

19
Q

In which layer of the network stack does IP smurfing attack take place?

A

Network layer

20
Q

Which security goal focuses on preventing unauthorized access to information?

A

Confidentiality