Study Questions Flashcards
1
Q
What is the purpose of security frameworks?
A
- Protecting PII.
- Securing financial information.
- identify security weaknesses
- Managing organizational risks.
- Aligning security with business goals.
2
Q
What are the four core components of frameworks?
A
- Identifying and documenting security goals.
- Setting guidelines to chief security goals.
- Implementing strong security process.
- Monitoring and communicating results.
3
Q
What are the three core principles and ethical security?
A
- Confidentiality: only authorized users can ask a specific assets or data.
- Privacy protections: safeguarding personal information from an authorized users.
- Laws: rules that are recognized by a community and enforced by a governing entity.
4
Q
What are the seven reasons why social engineering attacks are affective?
A
- Authority: throat actors impersonate individuals with power. This is because people in general have been conditioned to respect and follow authority figures.
- Intimidation: threat actors Use bullying tactics. This includes persuading and intimidating victims into doing what they’re told.
- Consensus/social proof: because people sometimes do things that they believe many others are doing thread actors. Use others trust to pretend they are legitimate.
- Scarcity: a tactic used to imply that goods or services are Unlimited supply
- familiarity: threat actors, establish a fake emotional connection with users that can be exploited
- Trust: threat actors, establish an emotional relationship with users that can be exploited overtime. They use this relationship developed trust in game personal information
- Urgency: a threat actor persuade others to respond quickly and without requesting
5
Q
What are the eight CISSP security domains?
A
- Security and risk management: define security goals and objectives, risk mitigation, compliance, business continuity and the law
- Asset security: secures digital and physical assets. It is also regulated to the storage, maintenance, retention. and destruction of data.
- Security, architecture and engineering: optimize data security by ensuring effective tools, systems, and processes are in place.
- Communication in network security: manage and secure physical networks and wireless communications.
- Identity and access management: keeps data secure, by ensuring users follow establish policies to control and manage physical assets like office spaces, and logical assets, such as networks and applications
- Security assessment and testing: conducting security control testing, collecting and analyzing data, and conducting security audits to monitor for risks, threats, and vulnerabilities.
- Security operations: conducting investigations and implementing preventative measures.
- Software development security: uses secure coding practices, which are a set of recommended guidelines that are used to create secure applications and services.
6
Q
What are the benefits of Cybersecurity?
A
- Protects against internal and external threats
- Meet regulatory compliance.
- Maintains and improves business productivity.
- Reduces expenses.
- Maintaining brand trust.
7
Q
What are the primary responsibilities of an analyst?
A
- Protecting computer and network systems.
- Installing prevention software.
- Conducting periodic security audit.
8
Q
What are the different types of Phishing?
A
- Business Email Compromise (BEC): A threat actor sends an email message that seems to be from a known source to make a seemingly legitimate request for information, in order to obtain a financial advantage.
- Spear phishing: A malicious email attack that targets a specific user or group of users. The email seems to originate from a trusted source.
- Whaling: A form of spear phishing. Threat actors target company executives to gain access to sensitive data.
- Vishing: The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source.
- Smishing: The use of text messages to trick users, in order to obtain sensitive information or to impersonate a known source.
9
Q
What are different types of malware?
A
- Virus: a piece of malicious code that spreads from onecomputer to another by attaching itself to other files using self replication.
- Worms: a self-replicating Malware that does not require human interaction.Their main is goal is to just spread and cripple resources orturn computers into zombies.
- Trojan Horses (aka trojans): hiden Malware that causesdamage to a system or gives an attack access to the host.
- Spyware: the main goal of spyware is to track and report the usage of the host orto collect data that the attacker desires to obtain.
- Adware: code that automatically displays ordownloads unsolicited advertisements, usually seen on a browser pop up.
- RATs (Remote Access Tool OR Remote Access Trojans): RATs allow the attacker to gain unauthorized access andcontrol the computer.
- Rootkit: a piece of software that is intended to take full orpartial control of a system at the lowest level.
- Ransomeware: a malware that infects the host with a code thatrestricts the access to the computer or the data on it.
10
Q
What are the different social engineering attacks?
A
- Social media phishing: A threat actor collects detailed information about their target from social media sites. Then, they initiate an attack.
- Watering hole attack: A threat actor attacks a website frequently visited by a specific group of users.
- USB baiting: A threat actor strategically leaves a malware USB stick for an employee to find and install, to unknowingly infect a network.
- Physical social engineering: A threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location.
11
Q
What is the CIA triad and what do each of the Letter in CIA stand for and their meaning
A
A foundational model that helps inform how organizations consider risk when setting up systems and security policies
- C: Confidentiality: Only authorized users can access specific assets or data
- I: Integrity: Data is correct, authentic, and reliable
- A: Availability: Data is accessible to those who are authorized to access it