UNIT 1 Flashcards

1
Q

I.D.S.

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

S.I.E.M

A

Security Information and Event Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

S.I.E.M

A

Security Information and Event Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

threat actor

A

is any person or group who presents a security risk

AP or GWaPA - SR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Compliance

A

adhereing to government and organizational standards

long “AGO standards”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Frameworks

A

guidelines to mitigate risks and threats

GM - RT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Controls

A

safeguards designed to reduce specific risks

SD… RSR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Posture

A

is an organization’s ability to manage its defense of critical assets and data and react to change

… O A - M D / C A D - react to…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network security

A

Keeping network infrastructure secret from unauthorized access

knis ua
KNIS (knis like kiss) …. UA (united arabia)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud Security

A

Ensuring cloud assets are properly configured and accessible only to authorized users.

E C A. P C A. O A U.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Programming

A

is a process that can be used to create a specific set of instructions for a computer to execute tasks. These tasks can include:
-Automation of repetitive tasks (e.g., searching a list of malicious domains)
-Reviewing web traffic
-Alerting suspicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cybersecurity

A

Ensuring information confidentiality, integrity, and availability by protecting against unauthorized access and criminal exploitation.

EI - CIA by PA-UA and CE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PII

A

Personal Identifiable Information

any information used to infer an individual’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SPII

A

Sensitive personally indentifiable information

a specific type of PII that falls under stricter handling guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Technical Skills

A

skills that require knowledge of specific tools, procedures, and policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Threat

A

any circumstance or event that can negatively impact assets

ACE that can NIA

17
Q

Transferable Skills

A

skills from other areas that can apply to different careers