Lesson 1 Flashcards

1
Q

CISSP

A

Certified information systems security professional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CIA triad

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Domains of CISSP (1/8)

A

Security and risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Domains of CISSP (2/8)

A

Asset security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Domains of CISSP (3/8)

A

Security architecture/engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Domains of CISSP (4/8)

A

Communication network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Domains of CISSP (5/8)

A

Identify access management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Domains of CISSP (6/8)

A

Security assessment and testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Domains of CISSP (7/8)

A

Security operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Domains of CISSP (8/8)

A

Software development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Password attack

A

Brute force
Rainbow table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threat actor

A

Anyone that presents a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

BEC

A

Business email compromise
(Type of phishing attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Phishing

A

A security incident that affects not only digital but also physical environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Morris worm

A

The worm exploited weak passwords. Morris’s exploits became generally obsolete due to decommissioning rsh (normally disabled on untrusted networks), fixes to sendmail and finger, widespread network filtering, and improved awareness of weak passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The 3 layers of the web

A
  1. The surface
  2. The deep
  3. The dark
17
Q

Define security and risk management

A

Security goals and objectives. Risk mitigations (procedures and rules in place). Compliance (policies). Business continuity (maintaining). Legal legislations (laws, rules, ethics).

18
Q

GDPR

A

General data protection regulation

19
Q

PII

A

Personally identifiable information

20
Q

Asset security

A

Securing personal identifiable information (PII)

21
Q

IAM

A

Identity and access management
(Users following policies to maintain control)

22
Q

Security assessment and testing

A

Control testing, Audits, collection of data

23
Q

Security operations

A

Investigations implementation

24
Q

Software development security

A

Coding, secure apps

25
Q

Define Asset security

A

Storage, maintenance, retention, and destruction of both physical and virtual data.

26
Q

SIEM

A

System information and event management

27
Q

Define: Communication and network security

A

Focusing on managing and securing physical networks and wireless communications