Protect Data and Communicate Incidents M1 Flashcards

You will recognize the importance of security professionals in the workplace. You'll discover how proper detection and escalation can impact an organization’s security posture.

1
Q

What does a security mindset enable a security analyst to do when protecting their organization? Select two answers.

A
  1. Evaluate risks and identify potential system breaches
  2. Recognize what they are defending

A security mindset enables an analyst to recognize what they are defending. It also helps them evaluate risks and identify potential system breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of asset would have the least impact on an organization if it were compromised?

A
  1. Guest Wi-Fi network

A guest Wi-Fi network is an asset that would have the least impact on an organization if it were compromised because an organization’s business operations would experience little to no impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can security analysts cultivate a security mindset?

A
  1. By researching the latest security vulnerabilities

Security analysts can cultivate a security mindset by researching the latest security vulnerabilities. Staying updated about threats and vulnerabilities can help analysts take the necessary actions to prevent potential attacks from happening.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following examples describes the use of a security mindset? Select two answers.

A
  1. Exercising suspicion before opening email attachments
  2. Reporting suspicious emails

Exercising suspicion before opening email attachments and reporting suspicious emails are examples of the use of a security mindset. A security mindset can help you identify and reduce security risks and potential incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Public Data

A

Public data, such as press releases, job descriptions, and marketing materials, does not require additional security measures as it is already accessible to the public. While it poses a minimal risk to the organization if viewed or shared by others, it still needs protection from security attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Private Data

A

Private data is highly sensitive information that should be kept confidential and protected from unauthorized access. If someone gains access to this data without permission, it can pose a significant risk to the organization.

**Examples of private data can include company email addresses, employee identification numbers, and an organization’s research data. **

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Sensitive Data

A

Sensitive data includes personally identifiable information (PII), sensitive personally identifiable information (SPII), and protected health information (PHI). Examples include financial account numbers, social security numbers, passwords, passport numbers, and medical information.

**This information must be protected from everyone who does not have authorized access. Unauthorized access to sensitive data can cause significant damage to an organization’s finances and reputation. **

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Asset Classification

A

Asset classification means labeling assets based on sensitivity and importance to an organization. The classification of an organization’s assets ranges from low- to high-level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identify and Protect

A

Creating business continuity and disaster recovery plans are the final steps of a four-part process that most security teams go through to help ensure the security of an organization.

First, the security team identifies the assets that must be protected in the organization. Next, they determine what potential threats could negatively impact those assets. After the threats have been determined, the security team implements tools and processes to detect potential threats to assets. Lastly, the IT or appropriate business function creates the business continuity and disaster recovery plans. These plans are created in conjunction with one another. The plans help to minimize the impact of a security incident involving one of the organization’s assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Conduct a Business Impact Analysis

A

The business impact analysis step focuses on the possible effects a disruption of business functions can have on an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identify, Document, and Implement Steps to Recover ritical Business Functions and Processes

A

This step helps the business continuity team create actionable steps toward responding to a security event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Organize a Business Continuity Team

A

This step brings various members of the organization together to help execute the business continuity plan, if it is needed. The members of this team are typically from the cybersecurity, IT, HR, communications, and operations departments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Conduct Training for the Business Continuity Team

A

The team considers different risk scenarios and prepares for security threats during these training exercises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A security analyst notices that an employee has installed an app on their work device without getting permission from the help desk. The log indicates that potentially malicious code might have been executed on the host. Which of these security events should the security analyst escalate to a supervisor?

A

Both events should be escalated.

Both events should be escalated to a supervisor. There are no issues that are too small or too big. It’s always best to err on the side of caution and report events to the appropriate team members.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which are types of data and assets that stakeholders are most interested in protecting? Select two answers.

A
  1. Sensitive financial data
  2. Customers’ usernames and passwords

Sensitive financial data and customers’ usernames and passwords are examples of data and assets that stakeholders are most interested in protecting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank: When a security event results in a data breach, it is categorized as a _____.

A

Security incident

**When a security event results in a data breach, it is categorized as a security incident. However, if the event is resolved without resulting in a breach, it is not considered an incident. **

17
Q

Which of the following are examples of the potential impact of a security incident involving malicious code? Select three answers.

A
  1. Financial consequences
  2. Operational downtime
  3. Loss of assets

Operational downtime, financial consequences, and loss of assets are examples of the potential impact of a security incident involving malicious code.

18
Q

Business continuity plan (BCP)

A

A document that outlines the procedures to sustain business operations during and after a significant disruption

19
Q

Confidential data

A

Data that often has limits on the number of people who have access to it

20
Q

Disaster recovery plan

A

A plan that allows an organization’s security team to outline the steps needed to minimize the impact of a security incident

21
Q

Private data

A

Information that should be kept from the public

22
Q

Public data

A

Public data: Data that is already accessible to the public and poses a minimal risk to the organization if viewed or shared by others

23
Q

Security mindset

A

The ability to evaluate risk and constantly seek out and identify the potential or actual breach of a system, application, or data

24
Q

Sensitive data

A

A type of data that includes personally identifiable information (PII), sensitive personally identifiable information (SPII), and protected health information (PHI)