Network Security Fundamentals and CIA Triad Flashcards

1
Q

What is the collection of activities that protect the information system and the data stored in it?

A

Information Systems Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What protects information and resources?

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What protects data, network, hardware, and software?

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the types of approaches to cybersecurity?

A

Compliance-based, Risk-based, and Ad hoc-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which approach to cybersecurity is standards-based and implements security controls based on a standard and uses a checklist-based attitude?

A

Compliance-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which approach to cybersecurity implements security without any rationale and may portray insufficient subject knowledge to handle security?

A

Ad hoc-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which approach to cybersecurity focuses security implementation based on one or more risks and addresses risks that may be beyond organization’s tolerance and business needs?

A

Risk-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is anything valuable to you or your organization, like data, devices, or software, that needs protection?

A

Asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a weakness or flaw in hardware, software, or facilities that can be taken advantage of to compromise security?

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a method or tool used to take advantage of a vulnerability (program, script, or other mechanism)?

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is anything that has the potential to cause harm to your assets, like malware, hackers, or natural disasters?

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an action taken to harm your assets by exploiting vulnerabilities?

A

Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the potential or probability that a loss may occur and is focused on the potential of future events not present ones?

A

risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the entity behind a threat called?

A

Threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the method used for launching threats called?

A

attack vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the goal of the threat actor called?

A

target

17
Q

What part of the CIA Triad is about securing data, encryption, and limiting access?

A

Confidentiality

18
Q

What part of the CIA Triad is about data accuracy?

A

Integrity

19
Q

What part of the CIA Triad is about uptime, downtime, and percentage of availability?

A

Availability

20
Q

What is it called when you only give access to the minimum amount of resources a person needs to do their job?

A

Principle of least privilege