PRELIM QUIZ COMPILATION Flashcards

1
Q

MODULE 4

Its objective is to prevent cyber threats.

A
  • Network Security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MODULE 4

A components of Network Security that Controls the incoming and outgoing network traffic.

A
  • Firewalls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MODULE 4

A components of Network Security that Detects and removes malicious software In your device.

A

– Antivirus and anti-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MODULE 4

A republic act that enacted to protects the personal information.

A

– RA 10173

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MODULE 4

A republic act that addresses the crime committed using digital technology.

A

– RA 10175

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MODULE 4

It’s a network security threats that means there’s someone that Intercepting communication.

A

–Man in the middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MODULE 4

A components of Network Security that we used to secure remote access.

A

–VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MODULE 4

It’s a principle of secure network design that used to layered security approach.

A

– Defense in Depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MODULE 4

It’s a principle of secure network design that means Continuous verification and authentication.

A

– Zero Trust Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MODULE 4

Make a one sentence on what have you learned for today’s topic?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MODULE 3

______________ involves identifying potential hazards, evaluating the likelihood and impact of those hazards, and determining the necessary actions to reduce or eliminate risks.

A

– Risk Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MODULE 3

It’s a type of data that can be type and need a smaller size storage.

A

– Structured data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MODULE 3

It’s a type of data that needs a bigger size of storage.

A

–Unstructured data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MODULE 3

____________ refers to the framework, policies, and processes established to ensure the organization’s security objectives align with business goals.

A

– Information Security Governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MODULE 3

Conclusion

A

GOOD GOVERNANCE IS THE FOUNDATION OF A SECURE FUTURE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MODULE 2

It’s one of the risk mitigation strategies that means taking action before something happens.

A

Proactive Measures

17
Q

MODULE 2

It’s one of the risk mitigation strategies that means responding to something after it happens.

A

Reactive Measures

18
Q

MODULE 2

is the process of identifying, assessing, and prioritizing risks followed by coordinated efforts to minimize, monitor, and control the probability or impact of unfortunate events.

A

Risk Management

19
Q

MODULE 2

Key Elements of Risk Management

A

Risk Identification, Risk Assessment, Risk Mitigation, Risk monitoring and review

20
Q

MODULE 2

is a set of rules and guidelines that govern how an organization protects its assets, data, and systems from unauthorized access or attacks.

A

Security Policies

21
Q

MODULE 2

Standard for securing credit card information

22
Q

MODULE 2

International standard for information security management.

A

ISO/IEC 27001

23
Q

MODULE 2

Sets requirements for the protection of health information in the U.S.

24
Q

MODULE 2

Give 4 types of risk in an organization.

A

Operational risk, Financial risk, Reputational risk, Compliance risk, Cybersecurity risk

25
Q

MODULE 1

________ refers to the protection of digital devices, networks, systems, and data from unauthorized access, damage, or theft.

A

TECHNOLOGY SECURITY

26
Q

Key Threats in Technology Security

A
  • MALWARE
  • PHISHING
  • INSIDER THREATS
  • DOS ATTACKS
  • ZERO-DAY EXPLOITS
27
Q

BASIC PRINCIPLES OF SECURITY

A
  • CONFIDENTIALITY
  • INTEGRITY
  • AVAILABILITY
  • AUTHENTICATION
  • NON-REPUDIATION
28
Q

BEST PRACTICES FOR INDIVIDUALS

A
  • USE STRONG PASSWORDS
  • ENABLE 2FA
  • BE CAUTIOUS WITH EMAILS
  • REGULARLY UPDATE SOFTWARE
  • BACK UP DATA
29
Q

FUTURE TRENDS IN TECHNOLOGY SECURITY

A
  • Artificial Intelligence in Cybersecurity
  • Quantum Computing
  • Increased IoT Security
  • Biometric Authentication
  • Zero-Trust Architecture