Study 1 Flashcards

1
Q

What is the CIA Triad?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is due care?

A

Taking reasonable actions to prevent harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does ISO 27001 specify?

A

Information security management system (ISMS) requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who is responsible for data classification?

A

The data owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is data remanence?

A

Residual representation of data that remains after attempts to remove or erase it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is defense in depth?

A

Layered security approach to protect assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does a firewall do?

A

Filters network traffic based on predefined rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of IPSec?

A

Provides secure network communications using authentication and encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is multifactor authentication (MFA)?

A

Authentication using two or more factors from different categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does RBAC stand for?

A

Role-Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a vulnerability assessment?

A

Identifying and quantifying vulnerabilities in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of a security audit?

A

Evaluate compliance with security policies and standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an incident response plan?

A

A set of procedures for detecting, responding to, and recovering from incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does SIEM stand for?

A

Security Information and Event Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the main goal of secure coding practices?

A

Prevent common vulnerabilities such as buffer overflows and injection attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of the OWASP Top 10?

A

Highlight the most critical security risks to web applications