CSS 310 Quiz 3 Core Concepts

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/39

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:26 PM on 5/16/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

40 Terms

1
New cards

What is cloud computing?

On-demand access to remote infrastructure, platforms, and software over the internet.

2
New cards

What is SaaS?

Software as a Service — ready-to-use cloud applications.

3
New cards

SaaS examples?

Gmail, Canvas, Dropbox.

4
New cards

What is PaaS?

Platform as a Service — cloud platform used to build/deploy applications.

5
New cards

PaaS examples?

AWS Elastic Beanstalk, MongoDB Atlas.

6
New cards

What is IaaS?

Infrastructure as a Service — virtual servers, networking, and computing resources

7
New cards

IaaS examples?

AWS, Azure, Google Cloud.

8
New cards

What is the shared responsibility model?

Cloud provider secures the infrastructure; customer secures data/apps.

9
New cards

Biggest cloud security risks?

Misconfiguration, identity compromise, software vulnerabilities.

10
New cards

What is multi-tenancy?

Multiple customers sharing the same cloud infrastructure.

11
New cards

Main idea of Zero Trust?

Never trust, always verify.

12
New cards

What is least privilege?

Giving users only the minimum access needed.

13
New cards

Why is ZTNA better than VPNs?

Limits access and prevents lateral movement.

14
New cards

Why is Castle-and-Moat security outdated?

Attackers can bypass the perimeter through phishing, cloud access, and remote work.

15
New cards

What is lateral movement?

Attackers moving through a network after gaining access.

16
New cards

What is segmentation?

Dividing a network into smaller isolated zones.

17
New cards

What is micro-segmentation?

Security segmentation down to the workload/system level.

18
New cards

What is offensive security?

Authorized simulation of cyberattacks to test security.

19
New cards

What is penetration testing?

Ethical hacking used to identify vulnerabilities.

20
New cards

What are the 5 phases of ethical hacking?

Reconnaissance, Scanning, Gaining Access, Maintaining Access, Clearing Tracks.

21
New cards

What is reconnaissance?

Gathering information about a target before attacking.

22
New cards

Difference between active and passive reconnaissance?

Active interacts with the target; passive gathers public information.

23
New cards

What is scanning?

Identifying systems, ports, services, and vulnerabilities.

24
New cards

What is gaining access?

Obtaining unauthorized access to systems/data.

25
New cards

What is maintaining access?

Keeping persistent access through methods like backdoors.

26
New cards

What is clearing tracks?

Hiding evidence of an attack.

27
New cards

What is the Cyber Kill Chain?

Framework describing stages of a cyberattack.

28
New cards

Why is the Kill Chain useful?

Attacks can be stopped at multiple stages.

29
New cards

What is MITRE ATT&CK?

Framework mapping real attacker techniques and behaviors.

30
New cards

Difference between MITRE ATT&CK and Kill Chain?

MITRE is detailed techniques; Kill Chain is broad attack stages.

31
New cards

What is cybersecurity governance?

Oversight and accountability for cybersecurity decisions.

32
New cards

Main purpose of governance?

Direction, oversight, and accountability.

33
New cards

Difference between compliance and risk management?

Compliance asks “Are we following rules?” while risk management asks “What could go wrong?”

34
New cards

Does compliance automatically mean security?

No.

35
New cards

Most ignored cybersecurity risk?

Human error.

36
New cards

What does PCI-DSS protect?

Payment card/cardholder data.

37
New cards

What does HIPAA protect?

PHI/ePHI healthcare data.

38
New cards

What does GLBA apply to?

Financial institutions.

39
New cards

What is NIST 800-53?

Security framework for federal/government organizations.

40
New cards

Why was SOX created?

Response to financial fraud scandals.