full book

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/100

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:57 PM on 1/12/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

101 Terms

1
New cards

What controls are being adopted by the company for access management?

Preventive and Physical

2
New cards

What type of control is the investigation of log files by the IT administrator after an attack?

Detective control

3
New cards

What describes the task of creating a standard operating procedure by administrators?

Operational control

4
New cards

Which control focuses on minimizing threats before they occur?

Preventive control

5
New cards

What type of control is applied by the cybersecurity team when they immediately update systems after a critical patch is released?

Corrective control

6
New cards

After a ransomware attack, what control should be implemented to prevent future occurrences?

Preventive control

7
New cards

What physical control would deter someone from entering a quarry?

Bollards and Barrier signs

8
New cards

What type of control describes the action of including additional instructions in compliance policies?

Directive control

9
New cards

What control is used by a cybersecurity administrator employing homomorphic encryption?

Technical control

10
New cards

Which control category is tasked with establishing protocols to enhance organizational oversight?

Managerial control

11
New cards

What is the best resource for an IT administrator investigating attack methods?

MITRE ATT&CK

12
New cards

What system can track user access when using 802.1x authentication?

RADIUS

13
New cards

What can provide non-repudiation in transactions?

Asymmetric encryption

14
New cards

What is the best source to identify the culprit of a theft in a banking scenario?

An audit trail

15
New cards

What does a honeypot do?

Presents as a prized target to track attackers

16
New cards

What process describes assessing current resources against future aspirations?

Gap analysis

17
New cards

What method uses a private key to verify email integrity?

A digital signature

18
New cards

Which concept adapts access controls based on user risk profiles?

Adaptive identity management

19
New cards

What type of sensor detects changes in frequency?

Microwave sensors

20
New cards

What log ensures accountability for individuals?

A visitors log

21
New cards

What component of change management ensures that security operations aren't affected?

An approval process

22
New cards

What is the best solution to prevent employees from installing games on company systems?

An application allow list

23
New cards

What practice ensures the accuracy of system representations?

Updating diagrams

24
New cards

What outlines steps for unexpected change issues in change management?

A backout plan

25
New cards

In software development, what describes interconnections of services and drivers?

Dependencies

26
New cards

Why do organizations schedule maintenance windows for system updates?

To ensure updates do not disrupt users

27
New cards

What action helps refresh resources in applications?

An application restart

28
New cards

What's the primary purpose of reviewing test results before deploying software?

To identify potential issues

29
New cards

What vital process assesses potential consequences of changes?

Impact analysis

30
New cards

What is crucial to consider before executing a service restart in an enterprise?

Potential impact on interconnected services

31
New cards

What is the primary use of a private key in PKI?

Decryption and digital signatures

32
New cards

What's the type of encryption for large data volumes using a single key?

Symmetric encryption

33
New cards

What involves transforming sensitive data into unique tokens for secure transactions?

Tokenization

34
New cards

Which cryptographic method guarantees irreversible data transformation during encryption?

Asymmetric encryption

35
New cards

Which catalogs ensure security of digital certificates?

Certificate revocation lists (CRLs) and OCSP

36
New cards

What is needed to securely store cryptographic keys?

A Hardware Security Module (HSM) and Full-Disk Encryption (FDE)

37
New cards

What does key exchange involve in cryptography?

Securely transmitting cryptographic keys

38
New cards

What type of digital certificate lacks third-party validation?

Self-signed certificate

39
New cards

What technology serves as a decentralized digital ledger?

Blockchain

40
New cards

What technique obscures code to make it complex?

Obfuscation

41
New cards

What type of attack is an email urging personal information from a user?

Phishing

42
New cards

What is the technique used to hide messages in a picture?

Steganography

43
New cards

What is the most likely attack vector if a CEO’s phone gets hacked?

Connecting to a public Bluetooth headset

44
New cards

What differentiates spear phishing from regular phishing?

Targets high-profile individuals.

45
New cards

What type of threat might arise from a software download from a suspicious website?

A Trojan.

46
New cards

What protects data on company mobile phones from theft?

Remote wipe.

47
New cards

What do watering hole attacks aim to achieve?

Infect visitors of a compromised website.

48
New cards

What distinguishes a business email compromise attack?

The attacker poses as a legitimate organization.

49
New cards

What attack involves redirecting a misspelled website URL?

Typosquatting.

50
New cards

What describes creating a social media account to impersonate someone?

Disinformation.

51
New cards

What should a security administrator do if a laptop with sensitive data is left logged in?

Revoke the certificate.

52
New cards

What is the best practice to prevent rogue virtual machines?

Implement explicit provisioning guidelines.

53
New cards

What security practice should a CEO follow with their mobile for music?

Turn off Bluetooth after use.

54
New cards

What is the greatest risk in using a third-party service for an HR application?

Outsourcing code development.

55
New cards

What proactive measure can minimize data breaches in a company?

Implement Data Loss Prevention (DLP) measures.

56
New cards

What can counteract automated account compromises?

Deployment of Multi-Factor Authentication (MFA).

57
New cards

What's a security risk from a USB drive found in an office?

A malicious USB attack.

58
New cards

What unique risk accompanies software purchased from a market stall?

Uncertain origin and authenticity.

59
New cards

What is a VM escape?

An attack gaining unauthorized access to the host from a VM.

60
New cards

What should developers be cautious of when using third-party libraries?

Exposure to vulnerabilities.

61
New cards

What is the best description of a logic bomb?

A malicious code that executes on a set condition.

62
New cards

What type of attack involves malware disguising itself as legitimate software?

Trojan.

63
New cards

What is responsible for repeated user account lockouts in a company?

A brute-force attack.

64
New cards

What type of malware records bank credentials without permission?

A keylogger.

65
New cards

Which type of attack utilized stolen credentials to access company networks?

Credential stuffing.

66
New cards

What cyberattack overwhelms systems with excessive traffic?

A DDoS attack.

67
New cards

What type of vulnerability allows unauthorized file access via manipulated input parameters?

Directory traversal vulnerability.

68
New cards

What attack occurs when different inputs lead to the same hash output?

A collision attack.

69
New cards

What describes an attacker downgrading a secure connection for eavesdropping?

A TLS/SSL downgrade attack.

70
New cards

What describes systematic login attempts with common passwords?

A password spraying attack.

71
New cards

What technique minimizes risk through isolation in an enterprise?

Creating a VLAN.

72
New cards

What prevents users from installing unapproved software?

Creating an application allow list.

73
New cards

Which of the following protects system file integrity?

Executing 'sfc / scannow'.

74
New cards

What allows administrators to enforce settings in Windows environments?

Group Policy.

75
New cards

What does SELinux provide in Linux systems?

Mandatory access controls.

76
New cards

What type of authentication relies on physical devices?

Hard Authentication Tokens.

77
New cards

What technology enables passwordless access to Apache web servers?

SSH keys.

78
New cards

What describes ephemeral credentials in security?

Temporary access rights.

79
New cards

What is viewed as a biometric factor in multi-factor authentication?

Fingerprint Scan.

80
New cards

What enhances secure password practices for online accounts?

Password manager.

81
New cards

How many factors does smart card authentication involve?

Dual-factor.

82
New cards

What prevents recycling of passwords too often in a company?

Minimum password age.

83
New cards

What temporary access rights reduce exposure in privileged access?

Just-in-time permissions.

84
New cards

What best practices define secure identity federation?

SAML.

85
New cards

What approach combines automation and security operations?

SOAR.

86
New cards

What method assesses network security postures for weaknesses?

Penetration testing.

87
New cards

What type of audit identifies weaknesses in internal controls?

External audit.

88
New cards

What plays a key role in government compliance for organizations?

Right-to-audit clause.

89
New cards

What phase identifies risks in vendor management?

Due diligence.

90
New cards

What type of compliance is critical for industry regulations?

External compliance audits.

91
New cards

What should be prioritized in information security auditing?

Risk assessments.

92
New cards

Which stage involves oversight for ensuring organizational goals after audits?

Internal audits.

93
New cards

What helps verify compliance with external regulations in organizations?

Audits.

94
New cards

What is primarily focused on analyzing vulnerabilities through external review?

Independent assessments.

95
New cards

What outlines promises for confidential information management?

NDA.

96
New cards

What serves as the foundation for work orders in projects?

MSA.

97
New cards

What allows for the assessment of vendors and risk evaluations?

Supply chain analysis.

98
New cards

What demonstrates compliance adherence in a comprehensive manner?

Auditing practices.

99
New cards

What aspect is critical in determining acceptable data loss?

Recovery point objective (RPO).

100
New cards

What defines the risk acceptance strategy without proactive measures?

Acceptance.