FULL D827 flash cards

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/303

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:21 AM on 5/14/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

304 Terms

1
New cards

A law firm encrypts client case files stored on its file server. Which CIA principle?

Confidentiality

2
New cards

A DDoS attack takes an airline booking site offline during a holiday. Which CIA principle failed?

Availability

3
New cards

An auditor verifies a financial report has not been modified by comparing hashes. Which principle?

Integrity

4
New cards

A trader cannot deny placing an order because the system logged it with a tamper-evident timestamp. Which principle?

Non-repudiation

5
New cards

A user scans their fingerprint to unlock their work laptop. Which authentication factor?

Something you are

6
New cards

A user inserts a hardware security key into their laptop to log in. Which authentication factor?

Something you have

7
New cards

A user enters a PIN at an ATM. Which authentication factor?

Something you know

8
New cards

A user logs in with password, SMS code, and fingerprint. What does this combination represent?

Multi-factor authentication

9
New cards

A company grants employees only the minimum access needed for their role. Which principle?

Least privilege

10
New cards

A bank requires two different people to approve a wire transfer above 100000 dollars. Which principle?

Separation of duties

11
New cards

A healthcare billing company replaces patient account numbers with reversible surrogate values. Which technique?

Tokenization

12
New cards

A company stores login passwords using bcrypt with a salt. Which technique?

Hashing

13
New cards

A cardiology clinic stores electronic health records. Which US law governs this?

HIPAA

14
New cards

A public school district discloses student GPAs without consent. Which law was potentially violated?

FERPA

15
New cards

A fintech startup handles customer loan applications. Which US law applies?

GLBA

16
New cards

A French employee personal data is processed by a US parent company. Which regulation applies?

GDPR

17
New cards

A publicly traded company must certify its financial reporting controls annually. Which law?

SOX

18
New cards

A federal civilian agency needs to implement an information security program. Which law?

FISMA

19
New cards

An attacker is prosecuted for unauthorized access to a government system. Which US law applies?

CFAA

20
New cards

A subpoena seeks stored email communications. Which US law governs access?

ECPA

21
New cards

Which NIST publication provides the controls catalog for federal systems?

NIST SP 800-53

22
New cards

Which NIST publication covers controls for contractors handling CUI?

NIST SP 800-171

23
New cards

Which NIST publication is the Secure Software Development Framework?

NIST SP 800-218

24
New cards

Which NIST publication guides VPN configuration?

NIST SP 800-77

25
New cards

Which NIST CSF function covers asset inventory and risk assessment?

Identify

26
New cards

Which NIST CSF function covers implementing safeguards?

Protect

27
New cards

Which NIST CSF function covers monitoring and alerting on events?

Detect

28
New cards

Which NIST CSF function covers forensic analysis after an incident?

Respond

29
New cards

Which NIST CSF function covers restoring services after an incident?

Recover

30
New cards

An international firm wants a certifiable Information Security Management System standard. Which?

ISO IEC 27001

31
New cards

A web app lets any logged-in user edit a URL parameter to view another user profile. Which OWASP category?

Broken Access Control

32
New cards

A banking app transmits credentials over unencrypted HTTP. Which OWASP category?

Cryptographic Failures

33
New cards

An attacker enters malicious SQL code into a search field. Which OWASP category?

Injection

34
New cards

A cloud storage service ships with default demo credentials enabled. Which OWASP category?

Security Misconfiguration

35
New cards

A team uses a six-year-old framework with known vulnerabilities. Which OWASP category?

Vulnerable and Outdated Components

36
New cards

An app allows unlimited password guesses with no account lockout. Which OWASP category?

Identification and Authentication Failures

37
New cards

An app accepts unsigned software updates over the network. Which OWASP category?

Software and Data Integrity Failures

38
New cards

A breach goes undetected for nine months because no logs were retained. Which OWASP category?

Security Logging and Monitoring Failures

39
New cards

An app security is fundamentally flawed at the design level, not a coding bug. Which OWASP category?

Insecure Design

40
New cards

A developer runs a tool against source code before committing. Which testing method?

SAST

41
New cards

A penetration tester attacks a running staging environment. Which testing method?

DAST

42
New cards

A tool generates an SBOM and flags dependencies with known CVEs. Which testing method?

SCA

43
New cards

A QA engineer floods an app with random malformed inputs looking for crashes. Which technique?

Fuzz testing

44
New cards

An attacker overflows a fixed-size input buffer to overwrite memory. Which vulnerability?

Buffer overflow

45
New cards

A vendor uses a certificate to prove software came from them and was not altered. Which practice?

Code signing

46
New cards

A security practice integrates controls across every SDLC phase. What is this called?

Secure SDLC

47
New cards

A branch office connects to headquarters through an encrypted router-to-router tunnel. Which VPN type?

Site-to-site VPN

48
New cards

A traveling sales rep uses a VPN client on their laptop to access HQ. Which VPN type?

Client-to-site remote access VPN

49
New cards

A VPN routes all of a user traffic including web browsing through the corporate tunnel. Which mode?

Full tunnel

50
New cards

A VPN only routes traffic destined for corporate resources and public internet goes direct. Which mode?

Split tunnel

51
New cards

A system passively monitors a copy of network traffic and generates alerts. What is it?

Passive NIDS

52
New cards

A system sits inline and actively drops malicious packets. What is it?

Inline NIPS

53
New cards

An IDS builds a baseline of normal behavior and flags deviations. Which detection method?

Anomaly-based detection

54
New cards

An IDS matches traffic against known attack patterns. Which detection method?

Signature-based detection

55
New cards

An IDS uses adaptive techniques that modify signatures based on learned behavior. Which detection method?

Heuristic-based detection

56
New cards

An attacker overwhelms a switch MAC address table so all traffic is broadcast. Which attack?

MAC flooding

57
New cards

An attacker floods a server with requests to exhaust resources. Which attack?

DoS

58
New cards

Many compromised devices flood a target simultaneously. Which attack?

DDoS

59
New cards

Which protocol combines SPF and DKIM to enforce email authentication policy?

DMARC

60
New cards

Which VPN protocol operates at the data link layer and is often paired with IPSec?

L2TP

61
New cards

A quick targeted fix for a specific software problem is called

Hotfix

62
New cards

A bundled collection of patches and hotfixes is called

Service pack

63
New cards

The process of distributing and applying software updates is called

Patch management

64
New cards

An attacker researches an exec travel and sends a targeted fake invoice. Which attack?

Whaling

65
New cards

An attacker calls an employee pretending to be IT to extract a password. Which attack?

Vishing

66
New cards

An attacker fabricates a believable scenario to deceive a target. Which technique?

Pretexting

67
New cards

An unauthorized visitor slips through a secure door behind an employee. Which attack?

Piggybacking

68
New cards

Malware that disguises itself as legitimate software is called a

Trojan

69
New cards

Malware that secretly monitors user activity is called

Spyware

70
New cards

Malware that hides deep in the OS to maintain persistent access is called a

Rootkit

71
New cards

IP

Internet Protocol

72
New cards

ISO/IEC

International Organization for Standardization / International Electrotechnical Commission

73
New cards

FISMA

Federal Information Security Management Act

74
New cards

PCI DSS

Payment Card Industry Data Security Standard

75
New cards

SQL

Structured Query Language

76
New cards

ARP

Address Resolution Protocol

77
New cards

FERPA

Family Educational Rights and Privacy Act

78
New cards

NIST

National Institute of Standards and Technology

79
New cards

NIST SP 800-53

Security and privacy controls for federal systems

80
New cards

NIST SP 800-77

VPN configuration guidance

81
New cards

NIST SP 800-218

Secure Software Development Framework (SSDF)

82
New cards

NIST SP 800-171

Security controls for contractors handling Controlled Unclassified Information (CUI)

83
New cards

IoT

Internet of Things

84
New cards

ECPA

Electronic Communications Privacy Act

85
New cards

GLBA

Gramm-Leach-Bliley Act

86
New cards

GDPR

General Data Protection Regulation

87
New cards

HIPAA

Health Insurance Portability and Accountability Act

88
New cards

SOX

Sarbanes-Oxley Act

89
New cards

CFAA

Computer Fraud and Abuse Act

90
New cards

DDoS

Distributed Denial of Service

91
New cards

DoS

Denial of Service

92
New cards

ISMS

Information Security Management System

93
New cards

MFA

Multi-Factor Authentication

94
New cards

RBAC

Role-Based Access Control

95
New cards

CWE

Common Weakness Enumeration

96
New cards

CVE

Common Vulnerabilities and Exposures

97
New cards

SSDF

Secure Software Development Framework

98
New cards

SDLC

Software Development Life Cycle

99
New cards

OWASP

Open Worldwide Application Security Project

100
New cards

SAST

Static Application Security Testing