S1 M4 Flashcards

1
Q

CIS Control 10 - Malware Defenses

A

Assists companies in preventing the installation of malware onto their devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CIS Control 11 - Data Recovery

A

Establishes data backup, testing, and restoration process that allow organizations to effectively recover company assets to a pre-incident state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIS Control 13 - Network Monitoring and Defense

A

Control establishes procedures for monitoring and defending a company’s network infrastructure against both internal and external threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CIS Control 12 - Network Infrastructure Management

A

Control establishes procedures and tools to for managing and securing a company’s network infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Denial of Service (DOS) attacks

A

Someone gains access to a system and overloads it with traffic so it is rendered useless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ransomware

A

Attacker gains access to a system, blocks users out, and essentially holds the system for ransom until you pay them to get it back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CIS Control 14 - Security Awareness and Skills Training

A

Guides organizations to create a security awareness and training program to inform employees and reduce cybersecurity risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIS Control 15 - Service Provider management

A

Helps organizations evaluate third party service providers who handle sensitive data. If we are we going to work with a service provider, we want to make sure they are on the same page about protecting our clients data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CIS Control 16 - Application Software Security

A

Establishes safeguards that manage the entire lice cycle of software that is acquired, hosted, or developed in house to detect and resolve cybersecurity weaknesses before they are exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CIS Control 17 - Incident Response Management

A

Recommendations necessary to establish an incident response management program to detect and respond to cybersecurity attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CIS Control 18 - Penetration Testing

A

someone internal to your organizations simulates a cybersecurity attack in an effort to find and exploit a weak point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly